Site icon Merchant Fraud Journal

What is Account Takeover and How to Prevent It

geralt / Pixabay

Account takeover fraud is when a hacker gains unauthorised access to a users account. They happen because companies and individuals do not know how to protect their personal information from fraudsters.

The threat is becoming a bigger threat everyday. Fraudsters know how lucrative this type of attack can be, and so companies increasingly need to ask themselves what account takeover is doing to their business, and what they can do to protect themselves against it.

The good news is there are many known best practices to prevent account takeover fraud. For example, companies should use an eCommerce fraud prevention solution that analyses a user’s on-site behavior to identify known fraudulent patterns. Companies should also secure their login experience by requiring two factor authentication (2FA) and requiring frequent password changes. Customers must also help by choosing strong passwords and remaining vigilant for phishing attacks.

In this article, we talk about what account takeover fraud is and how to prevent it.

What is account takeover fraud?

Account takeover fraud is the use of an online account by someone without the account owner’s permission in order to commit some kind of fraud or crime. Common account takeover targets are corporate accounts and personal bank accounts.

For example, a fraudster can trick a company employee into sending cash to a known vendor at an account the fraudster controls. Or, an employee can enter the login information for the corporate account into a site that looks like it belongs to the legitimate financial institution but in reality is controlled by the fraudster to collect the user’s keystrokes.

Personal bank account takeover is when a fraudster gains unauthorised access to an account and makes purchases or transfers money to accounts they control. For purchases, the fraud is most common at eCommerce stores where fraudsters can purchase things quickly and easily before the breach is discovered. Online gift card fraud is another common scam because fraudsters can use gift card balances interchangeably with cash to purchase things on the dark web.

Account takeover protection is so important because the consequences of attacks are high. For businesses, chargeback prevention is very difficult when a purchase is made from an account that made legitimate purchases in the past. For account holders, there is a huge loss of time trying to get their money back and also a lot of inconvenience in having to repair their reputation with online merchants.

How do hackers steal your information?

The most common ways hackers steal information are by either compromising the software in your computer, or tricking you into thinking you are providing account information to a legitimate vendor when you are in fact providing it to the fraudster.

Here are the most common ways hackers steal your information:

Phishing Attacks

Phishing attack account takeovers are when a fraudster tries to trick you into clicking on a link in an email that downloads malicious software to your computer. Once you download the phishing attack software, the fraudster can steal account information in order to perform account takeovers without being detected.

There are two types of phishing attacks: phishing and spear phishing. The difference between them is that phishing does not personalize the attack emails sent to potential victims and there is no specific target—the fraudster sends a huge number of generic emails with the expectation that some people will click on them.

In contrast, spear phishing attacks target a specific merchant and will personalize the email with details that increase the likelihood the victim will believe it is legitimate. Spear phishing attacks require more work, but fraudsters can pick high-value targets to make the potential payoff worth the effort.

Rogue Mobile apps

Account takeovers on mobile apps have exploded in the last few years. One common type of attack is when a fraudster purchases stolen account credentials and then tries them on other applications. The goal is to find an application with the same credentials and then use the account to make unauthorized purchases.

Another type of mobile app account takeover is when hackers create unauthorized clones, which are basically fake mobile applications that appear to be legitimate but are actually designed to steal your data. In this scam, fraudsters will log the keystrokes from your application and then use them to commit fraud either on the legitimate version of the application, or by finding other applications with the same login credentials.

Banking Trojans

Bank account takeovers are usually accomplished by the use of banking trojans. A banking trojan is a piece of software code known as malware that infects a user’s computer and allows hackers to steal login credentials to their accounts.

Banking trojan account takeovers are difficult to spot because the malware is hidden by hackers in a way that makes it look like a piece of code that provides benefits. Common examples of banking trojans are anything people find fun or useful like games, apps to increase mobile phone performance, or even entire programs like messaging or location services. All of these programs will provide the service as described, and run the malicious hacking software in the background.

One a device is infected, the banking trojan will steal login credentials, use the device to build botnets, and sometimes even steal money directly.

Brand Abuse

Brand abuse account takeovers are when fraudsters impersonate the online properties of a brand such as its website, mobile application, or social media accounts in order to trick users into providing sensitive personal information.

Brand abuse protection involves constantly scanning the internet to find any websites or accounts that mimic your brand. This includes your company name, logo, promotional material, or anything else that might cause a user to believe they are interacting with your brand. In addition, fraudsters will falsely claim your brand has a partnership with them—anything to gain the trust of the user so they will let their guard down.

Brand abuse social media fraud is when fraudsters set up a fake social media account that deceives users into believing it is controlled by the brand itself. From this account, the fraudsters can vouch for websites and mobile apps that are fraudulent, trick users into providing account information to fake brand representatives, and sell counterfeit goods. Sometimes, they can even trick employees into providing information about sensitive internal systems.

Credential Stuffing

Credential stuffing account takeover fraud is when hackers use software to automate the entry of username/password combinations in order to find ones that match an existing account. They are closely tied to data breaches because they use known login combinations stolen from the dark web in order to increase the rate of success.

Credential stuffing defense for companies requires monitoring their systems to detect variations in the volume of attempted logins and failed logins. Spikes in both can indicate automated login attempts. Companies should also require customers to frequently change their password, which decreases the amount of time stolen login credentials remain valid to access an account.

How to Prevent Account Takeover Fraud

Individuals and companies need to know how to fight account takeover fraud. However, their are different strategies and tactics for each one. In this section, we’ll explain the best practices to prevent account takeover fraud.

Individuals

Individuals need to take the security of their accounts into their own hands. They cannot rely on businesses to prevent account takeover fraud for them. Companies have consistently shown themselves unable to rise to the challenge, and so you should follow these best practices to keep your personal information safe online:

Companies

Account takeover costs to business are high.

On the consumer facing side, the damage to a brand’s reputation from a successful attack is huge. Today’s shoppers know the risks, and increasingly expect businesses to keep them protected and know how to keep customer accounts safe. In addition, there is chargeback prevention. Although eCommerce fraud prevention companies know how to prevent account takeover chargebacks, nothing is foolproof. The best strategy is still to prevent account takeovers to begin with.

Corporate account takeover is another major concern. Thieves are increasingly adept at tricking employees into handing over sensitive account information. Common examples include tricking an employee into thinking a bill is from a vendor and sending money to a fake account, or even changing the default account for a vendor that receives a monthly payment.

Here are some best practices to consider to stop these frauds:

If you need additional information and want to read more, you can also check out our in-depth look at how to detect account takeover fraud.


Sources:

https://www.bankofhope.com/combating-corporate-account-takeover

https://www.group-ib.com/brandprotection/brand-misuse.html

http://pages.siftscience.com/rs/526-PCC-974/images/eBook-Complete-Guide-to-Preventing-Account-Takeover.pdf

https://owasp.org/www-community/attacks/Credential_stuffing

Exit mobile version