• Latest

What is Account Takeover and How to Prevent It

May 15, 2019 - Updated On June 22, 2020
Veeam Releases Kasten for Kubernetes v7.5, Elevating its #1 Data Resilience Market Position with Enhanced Security and Modern Virtualization

Veeam Releases Kasten for Kubernetes v7.5, Elevating its #1 Data Resilience Market Position with Enhanced Security and Modern Virtualization

February 28, 2025
Major Milestone for PDX Beam as Crypto-to-Fiat App Is Now Available in Apple App Store and Google Play

Major Milestone for PDX Beam as Crypto-to-Fiat App Is Now Available in Apple App Store and Google Play

February 20, 2025
Sardine AI Raises $70M to Make Fraud and Compliance Teams More Productive

Sardine AI Raises $70M to Make Fraud and Compliance Teams More Productive

February 18, 2025
Swap and Signifyd Partner to Empower Brands With Secure, Seamless Global Commerce

Swap and Signifyd Partner to Empower Brands With Secure, Seamless Global Commerce

February 13, 2025
Worldpay to Acquire Ravelin, a Leading AI-Native Fraud Prevention Platform

Worldpay to Acquire Ravelin, a Leading AI-Native Fraud Prevention Platform

February 12, 2025
Socure Verifies Over 2.7 Billion Identity Requests in 2024, Achieves Market-Leading Performance Amidst Increasing AI and Fraud Threats

Socure Verifies Over 2.7 Billion Identity Requests in 2024, Achieves Market-Leading Performance Amidst Increasing AI and Fraud Threats

February 10, 2025
NVISIONx Unveils Nx+RexAI: Redefining Data Security Posture Management with GenAI-Powered Contextual Classification

NVISIONx Unveils Nx+RexAI: Redefining Data Security Posture Management with GenAI-Powered Contextual Classification

February 5, 2025
AuthenticID Annual Report Reveals Surge in Identity-Based Fraud Across Businesses

AuthenticID Annual Report Reveals Surge in Identity-Based Fraud Across Businesses

February 3, 2025
N-able Furthers Open Ecoverse Vision with Launch of AI-Powered Developer Portal—Accelerating API Integrations for Faster, Seamless IT and Security Services Delivery

N-able Furthers Open Ecoverse Vision with Launch of AI-Powered Developer Portal—Accelerating API Integrations for Faster, Seamless IT and Security Services Delivery

January 30, 2025
Zest AI to Deliver First Seamless AI Application Fraud Detection for MeridianLink Clients

Zest AI to Deliver First Seamless AI Application Fraud Detection for MeridianLink Clients

January 29, 2025
Hiya Launches First AI Call Assistant That Stops Live and Deepfake Scams in Real-Time

Hiya Launches First AI Call Assistant That Stops Live and Deepfake Scams in Real-Time

January 28, 2025
Deep Instinct Expands DSX for Cloud Protection to Amazon FSx NetApp

Deep Instinct Expands DSX for Cloud Protection to Amazon FSx NetApp

January 24, 2025
  • Contribute
  • Contact Us
  • About
  • Join Us
  • Advertise
Sunday, May 18, 2025
Merchant Fraud Journal
ADVERTISEMENT
  • Home
  • Articles
    • Chargebacks
    • Fraud Prevention
    • Influencer Insights
  • Resources
    • Recorded Webinars
    • Podcasts
    • Vendor Directory
    • eCommerce Fraud Reports
    • Training and Certifications
    • Jobs Board
    • Associations and Non-Profits
  • News
No Result
View All Result
  • Home
  • Articles
    • Chargebacks
    • Fraud Prevention
    • Influencer Insights
  • Resources
    • Recorded Webinars
    • Podcasts
    • Vendor Directory
    • eCommerce Fraud Reports
    • Training and Certifications
    • Jobs Board
    • Associations and Non-Profits
  • News
No Result
View All Result
Merchant Fraud Journal
No Result
View All Result

What is Account Takeover and How to Prevent It

Account takeover fraud is when a hacker gains unauthorised access to a users account. They happen because companies and individuals do not know how to protect their personal information from fraudsters.

The threat is becoming a bigger threat everyday. Fraudsters know how lucrative this type of attack can be, and so companies increasingly need to ask themselves what account takeover is doing to their business, and what they can do to protect themselves against it.

The good news is there are many known best practices to prevent account takeover fraud. For example, companies should use an eCommerce fraud prevention solution that analyses a user’s on-site behavior to identify known fraudulent patterns. Companies should also secure their login experience by requiring two factor authentication (2FA) and requiring frequent password changes. Customers must also help by choosing strong passwords and remaining vigilant for phishing attacks.

In this article, we talk about what account takeover fraud is and how to prevent it.

What is account takeover fraud?

Account takeover fraud is the use of an online account by someone without the account owner’s permission in order to commit some kind of fraud or crime. Common account takeover targets are corporate accounts and personal bank accounts.

For example, a fraudster can trick a company employee into sending cash to a known vendor at an account the fraudster controls. Or, an employee can enter the login information for the corporate account into a site that looks like it belongs to the legitimate financial institution but in reality is controlled by the fraudster to collect the user’s keystrokes.

Personal bank account takeover is when a fraudster gains unauthorised access to an account and makes purchases or transfers money to accounts they control. For purchases, the fraud is most common at eCommerce stores where fraudsters can purchase things quickly and easily before the breach is discovered. Online gift card fraud is another common scam because fraudsters can use gift card balances interchangeably with cash to purchase things on the dark web.

Account takeover protection is so important because the consequences of attacks are high. For businesses, chargeback prevention is very difficult when a purchase is made from an account that made legitimate purchases in the past. For account holders, there is a huge loss of time trying to get their money back and also a lot of inconvenience in having to repair their reputation with online merchants.

How do hackers steal your information?

The most common ways hackers steal information are by either compromising the software in your computer, or tricking you into thinking you are providing account information to a legitimate vendor when you are in fact providing it to the fraudster.

Here are the most common ways hackers steal your information:

Phishing Attacks

Phishing attack account takeovers are when a fraudster tries to trick you into clicking on a link in an email that downloads malicious software to your computer. Once you download the phishing attack software, the fraudster can steal account information in order to perform account takeovers without being detected.

There are two types of phishing attacks: phishing and spear phishing. The difference between them is that phishing does not personalize the attack emails sent to potential victims and there is no specific target—the fraudster sends a huge number of generic emails with the expectation that some people will click on them.

In contrast, spear phishing attacks target a specific merchant and will personalize the email with details that increase the likelihood the victim will believe it is legitimate. Spear phishing attacks require more work, but fraudsters can pick high-value targets to make the potential payoff worth the effort.

Rogue Mobile apps

Account takeovers on mobile apps have exploded in the last few years. One common type of attack is when a fraudster purchases stolen account credentials and then tries them on other applications. The goal is to find an application with the same credentials and then use the account to make unauthorized purchases.

Another type of mobile app account takeover is when hackers create unauthorized clones, which are basically fake mobile applications that appear to be legitimate but are actually designed to steal your data. In this scam, fraudsters will log the keystrokes from your application and then use them to commit fraud either on the legitimate version of the application, or by finding other applications with the same login credentials.

Banking Trojans

Bank account takeovers are usually accomplished by the use of banking trojans. A banking trojan is a piece of software code known as malware that infects a user’s computer and allows hackers to steal login credentials to their accounts.

Banking trojan account takeovers are difficult to spot because the malware is hidden by hackers in a way that makes it look like a piece of code that provides benefits. Common examples of banking trojans are anything people find fun or useful like games, apps to increase mobile phone performance, or even entire programs like messaging or location services. All of these programs will provide the service as described, and run the malicious hacking software in the background.

One a device is infected, the banking trojan will steal login credentials, use the device to build botnets, and sometimes even steal money directly.

Brand Abuse

Brand abuse account takeovers are when fraudsters impersonate the online properties of a brand such as its website, mobile application, or social media accounts in order to trick users into providing sensitive personal information.

Brand abuse protection involves constantly scanning the internet to find any websites or accounts that mimic your brand. This includes your company name, logo, promotional material, or anything else that might cause a user to believe they are interacting with your brand. In addition, fraudsters will falsely claim your brand has a partnership with them—anything to gain the trust of the user so they will let their guard down.

Brand abuse social media fraud is when fraudsters set up a fake social media account that deceives users into believing it is controlled by the brand itself. From this account, the fraudsters can vouch for websites and mobile apps that are fraudulent, trick users into providing account information to fake brand representatives, and sell counterfeit goods. Sometimes, they can even trick employees into providing information about sensitive internal systems.

Credential Stuffing

Credential stuffing account takeover fraud is when hackers use software to automate the entry of username/password combinations in order to find ones that match an existing account. They are closely tied to data breaches because they use known login combinations stolen from the dark web in order to increase the rate of success.

Credential stuffing defense for companies requires monitoring their systems to detect variations in the volume of attempted logins and failed logins. Spikes in both can indicate automated login attempts. Companies should also require customers to frequently change their password, which decreases the amount of time stolen login credentials remain valid to access an account.

How to Prevent Account Takeover Fraud

Individuals and companies need to know how to fight account takeover fraud. However, their are different strategies and tactics for each one. In this section, we’ll explain the best practices to prevent account takeover fraud.

Individuals

Individuals need to take the security of their accounts into their own hands. They cannot rely on businesses to prevent account takeover fraud for them. Companies have consistently shown themselves unable to rise to the challenge, and so you should follow these best practices to keep your personal information safe online:

  • Practice good password hygiene. This means having unique, strong passwords for every account you create. If you can’t keep track, get a password manager to keep track for you—they’re free and many have browser extensions that will auto-fill credentials when you land on a site.
  • Check to see if your login credentials have been compromised in a data breach. The Have I been Pwned password check will tell you if your email has shown up for sale on the dark web.
  • Enable two-factor authentication (2FA). Two-factor authentication requires you to provide an additional method of identity verification beyond your password/username combination to enter your account. There are numerous options such as devices and biometrics.
  • Never click on links in emails if you don’t know the sender. Fraudsters capitalise on you mindlessly clicking through links. Google and other email services will alert you when a sender isn’t in your contacts; if you see this warning, be extra-vigilant before clicking on anything.
  • Ignore ‘urgent’ email requests. Fraudsters often sow fear or urgency in order to provoke thoughtless action. If you receive an email threatening you, or professing ‘urgent action’, take a deep breath and assess the situation before clicking any links or going to any sites.
  • Don’t use public wifi. Hackers will get access to your machine through unsecured wifi. If you are away from home, use a personal mobile hotspot.

Companies

Account takeover costs to business are high.

On the consumer facing side, the damage to a brand’s reputation from a successful attack is huge. Today’s shoppers know the risks, and increasingly expect businesses to keep them protected and know how to keep customer accounts safe. In addition, there is chargeback prevention. Although eCommerce fraud prevention companies know how to prevent account takeover chargebacks, nothing is foolproof. The best strategy is still to prevent account takeovers to begin with.

Corporate account takeover is another major concern. Thieves are increasingly adept at tricking employees into handing over sensitive account information. Common examples include tricking an employee into thinking a bill is from a vendor and sending money to a fake account, or even changing the default account for a vendor that receives a monthly payment.

Here are some best practices to consider to stop these frauds:

  • Increase authentication protocols. Any mechanism that will move a lot of money quickly should be secured. Things like wires and ACH files must have multiple layers of authorization to be executed.
  • Strict employee access controls. Employees are routinely given access to sensitive information and authorization chains, and are often the weakest link in the security chain. Make it a priority to know who has access to what, and that all employees are given only the minimum amount of access required to accomplish their job.
  • Use anti-virus software. Commercial security software will help detect phishing attacks as well as other potential security breaches and vulnerabilities.
  • Monitor you login systems. The anatomy of account takeover attacks leave lots of traces and you can detect them. Things like increased login attempts, sudden spikes in password reset requests, and high chargeback volumes can all be algorithmically flagged to provide real-time warnings that your systems are under attack
  • Flag suspicious customer behavior. The login screen is not the only place you can detect account takeover fraud. You should get notifications for any abnormal customer behavior. This includes frequent purchase volumes for specific account or geographic regions, increased order values, massive reward point transfers, and changes to multiple data points like delivery address, IP address, and passwords.

If you need additional information and want to read more, you can also check out our in-depth look at how to detect account takeover fraud.


Sources:

https://www.bankofhope.com/combating-corporate-account-takeover

https://www.group-ib.com/brandprotection/brand-misuse.html

http://pages.siftscience.com/rs/526-PCC-974/images/eBook-Complete-Guide-to-Preventing-Account-Takeover.pdf

https://owasp.org/www-community/attacks/Credential_stuffing

Tags: Account Takeover Fraud
TweetShareSend
Previous Post

2019 AFP Payments Fraud and Control Survey Released

Next Post

Sextortion Email Scam Nets Fraudsters $1 million in Bitcoin

Next Post

Sextortion Email Scam Nets Fraudsters $1 million in Bitcoin

Download our latest report:

Our Latest Reports

2024 Fraud Trends Report

2023 Consumer Payments Survey Report

2023 Fraud Trends Report

2022 Chargeback Consumer Survey Report

Fraud Prevention Tactics that Enable Exceptional Customer Experience

Addressing Payment Fraud and The Customer Experience in 2022

2022 Fraud Trends Report

ATO Fraud In Retail Report

2022 Customer Experience Report

3 Ways a Unified Chargeback Management and Fraud Platform Increases Revenue

Digital Trust And Safety Report: Combating the Evolving Complexities of Payment Fraud

On-Demand Webinars

New Trends in The Payments Ecosystem

Balancing Customer Experience and Fraud Prevention: What’s the Secret?

Stopping Fraud Across the Customer Lifecycle

Addressing Payment Fraud and the Customer Experience in 2022

 

Featured Directory Listings

  • Signifyd
  • TransUnion
  • PayRetailers
  • Spotrisk
  • CB-ALERT
  • Chargeflow
  • Corepay
  • AtData

Get the 2024 Fraud Trends Report

Search Our Site

No Result
View All Result

Our Sponsors

Fraud Industry News

Veeam Releases Kasten for Kubernetes v7.5, Elevating its #1 Data Resilience Market Position with Enhanced Security and Modern Virtualization

Veeam Releases Kasten for Kubernetes v7.5, Elevating its #1 Data Resilience Market Position with Enhanced Security and Modern Virtualization

February 28, 2025
Major Milestone for PDX Beam as Crypto-to-Fiat App Is Now Available in Apple App Store and Google Play

Major Milestone for PDX Beam as Crypto-to-Fiat App Is Now Available in Apple App Store and Google Play

February 20, 2025
Sardine AI Raises $70M to Make Fraud and Compliance Teams More Productive

Sardine AI Raises $70M to Make Fraud and Compliance Teams More Productive

February 18, 2025

Connect With Us

Quick Navigation

  • Home
  • News
  • Join Us
  • About Us
  • Contact Us
  • Advertise
  • Contribute
  • Privacy Policy

The Payments Media Network

Merchant Fraud Journal
Payments Review

Privacy Policy

Our Privacy Policy
Our Terms of Use

Resources

  • Articles
  • eCommerce Fraud Reports
  • eCommerce Fraud Webinars
  • Training and Certifications
  • Jobs Board
  • Associations and Non-Profits
  • Podcasts
  • Vendor Directory

Popular Posts

  • What Is a Chargeback: A Primer for Merchants

    What Is a Chargeback: A Primer for Merchants

    0 shares
    Share 0 Tweet 0
  • Twitch Chargebacks for Streamers: Prevention and Recovery Opportunities

    0 shares
    Share 0 Tweet 0
  • How Does the Chargeback Process Work?

    0 shares
    Share 0 Tweet 0
  • How to win a fraud dispute: Get educated on the process and requirements for victory

    0 shares
    Share 0 Tweet 0

Featured Vendors

  • Signifyd
  • TransUnion
  • PayRetailers
  • Spotrisk
  • CB-ALERT
  • Chargeflow
  • Corepay
  • AtData

Download the 2023 Fraud Trends Report

No Result
View All Result
  • About Merchant Fraud Journal
    • Interested in Contributing or Guest Posting to Merchant Fraud Journal?
    • Merchant Fraud Journal Editorial Guidelines
  • Advertise on Merchant Fraud Journal
  • Articles
    • Chargebacks
    • Fraud Prevention
    • Influencer Insights
  • Contact Us
  • Download Addressing Payment Fraud and Customer Experience Report
  • Download Chargebacks Consumer Survey Report 2022
  • Download Evolving Complexities of Payment Fraud Report
  • Download Fraud Prevention Tactics that Enable Exceptional Customer Experiences Report
  • Download Merchant Fraud Journal 2023 Fraud Trends Report
  • Download Merchant Fraud Journal 2024 Fraud Trends Report
  • Download Merchant Fraud Journal Generative AI Fraud Prevention Checklist for SMBs
  • Download Quantifying the Challenge of Friendly Fraud: Your Post-purchase Strategy for the Future
  • Download the 2020 Chargeback and Representment Report
  • Download the 2020 Merchant Fraud Journal Vendor Guide
  • Download the 2021 Fraud Trends Report
  • Download the 2022 Fraud Trends Report
  • Download the 2023 Consumer Payment Trends Report
  • Download the 3 Ways a Unified Chargeback Management and Fraud Platform Increases Revenue Report
  • Download the MFJ 2022 Customer Experience Report
  • Download the MFJ ATO in Retail Report
  • Home
  • Home Elementor
  • Job Dashboard
  • Join The Merchant Fraud Journal Community
  • Merchant Fraud Journal Advertising Agreement
  • Merchant Fraud Journal Advertising Agreement – Signifyd
  • MFJ Fraud Trends Report Giveaway
  • News
  • Post a Job
  • Privacy Policy
  • Resources
    • #9978 (no title)
    • 2020 Chargeback Representment Guide for Merchants
    • 2020 Vendor Guide
    • 2023 Consumer Payments Survey Report
    • 3 Ways a Unified Chargeback Management and Fraud Platform Increases Revenue
    • Addressing Payment Fraud and the Customer Experience in 2022
    • Associations and Non-Profits
    • ATO Fraud In Retail Report
    • Balancing Customer Experience and Fraud Prevention: What’s the Secret?
    • Chargebacks Consumer Survey Report 2022
    • Digital Trust & Safety: Combating the Evolving Complexities of Payment Fraud
    • eCommerce Fraud Reports
    • eCommerce Fraud Webinars
    • Fraud Prevention Tactics that Enable Exceptional Customer Experiences
    • Fraud Prevention Training and Certifications
    • How to Build a Recession Proof Chargeback Prevention Strategy
    • How to Reduce Customer Friction During Holiday Sales Season
    • How to Stop Fraud During the 2022 Holiday Season
    • Jobs Board
    • Merchant Fraud Journal 2023 Fraud Trends Report
    • Merchant Fraud Journal’s Fraud Trends 2020 Report
    • Merchant Fraud Journal’s Generative AI Fraud Prevention Report: A Checklist for SMB Companies
    • Merchant Fraud Journal’s Fraud Trends 2021 Report
    • Merchant Fraud Journal’s Fraud Trends 2022 Report
    • MFJ’s 2022 Customer Experience Report
    • Podcasts
    • Prevent High-Velocity Fraud Attacks During the 2021 Holiday Season
    • Quantifying the Challenge of Friendly Fraud: Your Post-purchase Strategy for the Future
    • Stopping Fraud Across the Customer Lifecycle
    • The surprisingly easy way to secure your payment data, reduce your risk, and win the war on ecommerce fraud
    • Vendor Directory
    • Webinar – Addressing Payment Fraud and the Customer Experience in 2022
    • Webinar – Mitigating Fraud and Risk on the ACH Network
    • Win January Chargeback Disputes
  • Subscribed
  • Terms and Conditions

© 2021 Payments Media Solutions Canada Inc.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?