Complete Guide To Preventing Account Takeover PDF
Complete Guide To Preventing Account Takeover PDF
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Introduction
In December 2016, a Groupon user named Rachel casually Groupon is hardly the only brand—or the largest—to
checked her email and was shocked by what she found. see their name in the headlines due to an ATO attack.
A message in her inbox confirmed her successful order for Organizations ranging from Deliveroo to the UK National
an iPhone 6, bought using her Groupon account. But Rachel Lottery have suffered high-profile ATO attacks.
never made that order. Someone else had gained access to
her account without her permission.
13458
•• scamming other users, phishing through hacked credentialsP
V IIP
7
bought on the dark web
•• creating fake listings
•• spamming
134587
V IP
•• selling the credentials on the black market
account holder can’t access
7
P
V IIP
134587
V IP
Any website or app where users have accounts is at risk of account and uses it to buy tickets
7
48%
at the big cybersecurity headlines to get a clue. We’ve entered the era of the
data breach.
a website to look exactly like it belongs to a company factor authentication text messages that allow them to
someone’s familiar with—down to the fine print at the access bank accounts and other sensitive information.
bottom of the page. Then, they email potential victims to
try to get them to click on the link. Without carefully Mining social media
checking the site address, someone could easily give over
their login details. Have you listed your hometown or high school on a public
social media profile? If so, know that fraudsters who easily
Malware, Trojans, spyware discover this information may use it to crack passwords on
sites that use “standard” security questions. Other common
Another danger of clicking on unknown links is malware. personally identifiable information that people list on social
For example, following a malicious link can inadvertently media include birth dates, children’s names and birthdays,
download key-loggers that track what people are typing addresses, and phone numbers.
into login and password fields. A keylogger called iSpy was
recently tracked by security researchers, who discovered
to fraudsters
software licenses.
Social engineering
It’s no secret that people are moving more and more of their
In February 2016, The U.S. Department of Justice fell victim
lives online. Increasingly, the internet is where people meet,
to a hacker posing as a new employee who was struggling
date, engage on social issues, read news, and so much
to log in to the department’s online portal. He was given a
more. Websites and apps don’t just have access to one data
temporary token that gave him full access to data including
point—for example, a credit card—they hold an entire digital
email addresses and credit card numbers.
identity.
Social engineering attacks like these use psychological
Meanwhile, the fraud prevention community could be seen
tools to manipulate users into giving up confidential data.
as a victim of its own success. As the industry gets better
Criminals may call customer support and convince someone
at detecting some types of fraud, criminals move on to an
to give them access to a user’s account (especially if they
alternative method. For example, there’s already been ample
know some personal info, like SS#). Or they may send a
evidence that EMV has been pushing fraud from physical
phishing email to a company, carefully designed to look like
credit cards to the online channel. But increased security
it came from an executive at that business, asking someone
measures like EMV may also be leading more criminals
to turn over sensitive information.
to try their hands at ATO. More online businesses are also
beefing up their payment fraud detection capabilities, which
Hijacking a mobile device further squeezes fraudsters’ revenue sources and causes
them to look for alternative ways to make money.
The U.S. Federal Trade Commission reports an uptick in
mobile phone hijacking, where a criminal gains access to As fraudsters look to monetize different forms of data, the
a user’s mobile account. A thief can make use of a ton of price of non-payment-related account information has been
sensitive information if they have access to a mobile phone, driven higher and higher on the black market. Researchers
including payment credentials. And sophisticated fraudsters in 2016 found that account credentials command more
can also make use of a victim’s phone number to get two- money on the dark web than payment information
How much credentials are worth websites are not yet set up to detect ATO. Fraudsters can do
a lot of damage before they’re discovered.
on the black market
New opportunities
Modern business models are introducing new ways for
criminals to monetize the information they steal—like setting
up fake Uber driver accounts and charging “phantom” rides
to stolen accounts. Account ransoms using Bitcoin are also
Source: TrendMicro
on the rise.
Behavioral clues
Many of the signs of ATO are contained in subtle behavioral patterns across all of a user’s activity. An effective ATO
prevention tool is able to synthesize a range of activity and identify the anomalies. Here are some of the separate signals
that may point to a potential ATO:
•• Changing settings
•• Changing passwords
•• Unusual log out attempts. (It’s unusual for users to log out of certain services.)
But not every ATO victim proactively reports what happens to them. Some simply stop using a website or service, while
others close their account altogether. One way to gauge passive ATO damage is to analyze all of the users who have
deactivated their account. Do a post-mortem on a sample or each one (depending on volume), trying to determine whether
they have suffered ATO.
•• Email or text the user a one-time passcode to enter after login to confirm their identity.
•• Email or text an account link that the user can click to approve the new login from a new device.
•• Email or text the user a notification of a login from a new device so that they can be aware in case it’s not them.
•• Limit a user’s account actions (e.g., no updating password, no placing orders) until the user logs in again from a
trusted device or location.
You could choose to use a combination of the methods above to provide different levels of friction, based on the amount of
risk. When applied appropriately intelligently, these authentication steps not only minimize your risk, but could even increase
users’ trust in your site’s security, and by extension their trust in your product or service. You’ve got their back.
user accounts.
Sift Account Takeover Prevention was designed to help
businesses achieve a perfect balance of strong fraud Fewer account takeovers Better user experience Re
defenses and an excellent user experience. ATO Prevention wi
uses machine learning and advanced behavioral analysis to Better user experience
keep bad actors from accessing legitimate users’ accounts, Reduce login friction for valid
while guaranteeing as little interruption to the login process
Log In
users, making account access
as possible. simple yet secure.