Account Takeover 101
What is account takeover and how can you prevent it?
SpyCloud has been at the forefront of addressing the myriad challenges businesses face as they scramble to address escalating account takeover threats, while at the same time ensuring seamless customer experiences that don’t introduce unnecessary friction. As criminals up the ante in the cybercrime war, it is critical not only for businesses, but all of us, to understand how these attacks work and what you can do to prevent your enterprise, and yourself, from becoming a victim.
In an account takeover (ATO) attack, criminals use another person’s login credentials, most often by leveraging reused or similar passwords from previously breached sites, to gain access to existing accounts. Once inside, they make unauthorized transactions, siphon funds, and steal corporate data or personally identifiable information (PII) to use for other purposes, or simply to sell to other attackers on the dark web.
"Account takeover increased by 90% last year, causing an estimated $11.4 billion in losses."
The Account Takeover Timeline
Account takeover is a scary and dangerous threat with the potential to inflict significant financial harm on businesses and individuals. With so many entry points into cloud-based systems and networks, ATO presents one of the greatest risks to our digital world. Criminals don’t need to use sophisticated technologies to breach firewalls or other security measures intended to protect the enterprise. They just need your password.
There are 3 main phases in the lifecycle of an ATO attack. You are likely well aware of the initial phase – the data breach that is the impetus for stolen data to get into criminals’ hands. What you may not know is that breaches can happen months and even years before they make the news. What is happening during that time?


Phase 1: The Breach
The first step for criminals is to find and exploit vulnerabilities in websites and apps to gain access to their user database. A breach can impact thousands of users at a time, exposing not only their passwords, but even more sensitive information like account questions/answers, dates of birth, and phone numbers that can be put to use in follow-on attacks.

Phase 2: Targeted Account Takeover Attacks
During this time, the stolen data are high-value assets. Criminals are not yet turning to the dark web to sell them; instead they keep the stolen information contained within their trusted network until they’ve fully monetized it, which can take as long as 24 months. The attacker might engage trusted advisors to help them parse the data and crack passwords. They may target an organization they have a specific interest in, and identify VIPs with high levels of systems access, or exceptionally wealthy or high-profile victims who should be treated differently than the rest, and get creative in targeting them with manual account takeover. These tactics can be complex and hard to detect, and result in huge losses. In fact, SpyCloud customers report that 80% of losses come from 10% of ATO attacks, which are considered highly targeted. Having access to stolen data early in the breach timeline gives organizations a major advantage, enabling them to identify and reset compromised credentials before criminals have a chance to use them.

Phase 3: Automated Account Takeover Attacks
Having extracted as much value out of the stolen data as possible, the next step is to package it for sale to less sophisticated criminals, who can automate credential stuffing attacks with minimal effort, expense or expertise. Criminals know we commonly reuse the same password across different accounts, and credential stuffing is a type of brute-force attack that exploits this. It leverages automated, cheap, and easy-to-use tools to test large volumes of stolen usernames and passwords across multiple sites until one works. Even very old credential data can still yield results.
The Consequences of Account Takeover
Criminals are typically taking over accounts for profit, pure and simple. It all comes down to money, and how much of it criminals can extract from what they’ve stolen. Contrary to what you may have heard elsewhere, the first step to monetizing stolen data is not to sell it on the dark web. That’s actually the last step. What happens first is the highest effort, most profitable activities.
With stolen data, criminals will:

- Drain financial accounts, crypto wallets or loyalty point balances
Criminals will take control of financial accounts and immediately wire or transfer the balance from victims’ accounts. In a twist on this concept, there has been a huge uptick in peer-to-peer payments fraud, up 733% since 2016. - Make fraudulent purchases
Another quick scheme: criminals will purchase goods using stolen or stored credit card or gift card data. In fact, 40% of all fraudulent activity associated with an account takeover occurs within a day. - Create synthetic identities
Some criminals are specialists when it comes to creating new identities with a combination of fake and legitimate (stolen) data. The payoff might not come for months, since these identities need to be “warmed up” before they are used to obtain lines of credit. - Exploit victims’ work accounts
Criminals may try to locate and steal corporate IP and deploy business email compromise scams, which resulted in $2.4B in losses in 2021 alone. - SIM swap victims to bypass MFA
In a SIM swap attack, criminals transfer a victim’s phone number to their own SIM card in order to bypass multi-factor authentication and take over sensitive accounts.
Once maximum value from the data has been extracted, only then is it packaged up for sale on the dark web.
The Value of Stolen Data
How much your data is worth to other criminals varies quite a bit. Full packages of information on individuals (known as “fullz”) are desirable, giving criminals everything they need to commit identity fraud – typically name, national ID number, date of birth, and specific account credentials for $8-10 according to our own research and those of others in our space; however, when financial information is included, the criminal can command a
10x+ higher price.
For account credentials alone, let’s take a look at some representative average pricing for common account types, based on SpyCloud’s analysis of an estimated 308,214 transactions across 800 criminal shops on 3 prevalent ecommerce platforms in November & December 2020:
Bad Habits That Increase ATO Risk
Buried in each phase of the attack cycle are common habits we are all guilty of. To criminals, these habits are akin to leaving your spare house key under your front doormat: totally obvious. In other words, our online habits make us really easy marks. Likewise, for each common bad habit, criminals use their own common strategies and tools to their advantage.
Bad Habit
How Criminals Exploit It
We Choose Weak, Common Passwords
Password Spraying Attacks
Easy-to-remember passwords are also easy for bad actors to guess, making consumers vulnerable to password spraying. Password spraying is a brute force attack where a cybercriminal uses a list of usernames and common passwords to try to gain access to a particular site. Once they get a match, they’ll test that same username and password combination against as many accounts as possible.
There are plenty of news stories about admin passwords that contain the company name. It’s actually a huge problem that we’ve come across too many times to count in analyzing the SpyCloud breach database, and something we recommend customers include on their list of banned passwords.
We Reuse Passwords Across Multiple Accounts
Credential Stuffing Attacks
Credential stuffing makes it possible for criminals to profit from even very old breach data that they buy on the dark web and successfully take over multiple accounts. Credential stuffing tools let criminals test credential pairs against a number of websites to see which additional accounts they can take over; hence why password reuse is so dangerous. Some criminal tools can even test for common password variations, like changing certain letters to numbers (Password vs. P@ssw0rd) or adding numbers or symbols to the end of a word (password123). If a password has been exposed in one data breach, any other account with a variation of the same password is at risk.
We Click Links & Download Attachments from Unfamiliar Sources
Keylogger Malware
There are sites available on the dark web to purchase all the tools and services criminals need to launch malicious campaigns – the malware itself (yes, there’s even ‘malware-as-a-service’ now), hosting infrastructure, phishing kits, and spam service. It’s all aimed at making it very easy for users to fall for these schemes. Malware with keylogging components can record a user’s every move, and criminals will use the data for all manner of malicious purposes.
Preventing Account Takeover
For businesses, combating account takeover attacks requires dedicated detection and mitigation techniques. Considering the hyper-speed at which automated technologies are fueling account takeovers, it’s imperative that users remain educated on good security hygiene and put the information they learn into practice, while businesses put layers of proactive solutions in place. Users and businesses working together is the only way to disrupt the criminal’s ability to profit from stolen information. While organizations may not be able to prevent every breach or every ATO, when and how they respond to these threats will dictate how much they may lose.
Early Detection and Fast Remediation
NIST Password Security Compliance
- Previous breach exposures
- Less than 8 characters
- Context-specific words
- Dictionary words
- Repetitive characters
- Password hints
Taking Charge of Your Own Security Hygiene
Myth-Busting Your ATO Prevention Strategy
As soon as the good guys think they’ve figured it out, the bad guys try something new. In other words, you might think you’ve got your bases covered, but most criminals are already one step ahead of you.
Many organizations lean too heavily on the ‘status quo’ of cybersecurity. Each of these layers of protection can play a role, but they are flawed in their own ways that are important to understand.
Multi-Factor Authentication (MFA)
Requiring users to provide something they know (a password) plus something they are (biometrics) or something they have (smartphone token), is an important layer of protection and will deter some cyber attacks. Some. Not all. It is still possible via many avenues to bypass MFA. More importantly, it causes friction between the user and the service. Most of us will buck at pulling out our phones to tap ‘approve’ on a login multiple times a day and may turn MFA off at the first opportunity.
Password Managers
Even when companies mandate their use, most employees don’t use password managers at home or for personal services. This wouldn’t be such a problem if password reuse wasn’t so rampant and the lines between personal and employee accounts and devices weren’t already blurred. Confusing BYOD policies and the use of employee accounts on personal devices only make the situation worse.
90-Day Password Rotation
Password rotation policies actually benefit threat actors more than the users. Criminals test stolen credentials on a regular basis knowing that eventually, the user will think they’re safe and unknowingly reset their password to one that has already been compromised.
Behavior or Heuristic-Based Solutions
Many of these solutions have a machine-learning backend whose algorithms have been trained upon vast amounts of login and/or breach data. These algorithms, they claim, can detect a possible account takeover before it ever begins. Not true. Criminals perpetrating targeted ATO are using advanced tactics that are far less likely to tip off any AI that’s been trained on automated ATO data.
Dark Web Monitoring
Most solutions in the dark web monitoring category rely on scanners, crawlers and scrapers that troll dark web forums and pastebin sites for leaked credentials. Credentials that are for sale are almost never posted in their entirety in advertisements on dark web forums, the open web or any public environment that can be scanned. Bad actors usually post only a redacted sample of their credentials online to advertise their goods. The complete credential sets can only be obtained through vetted relationships with threat actors who sell and trade their fullz to trusted partners. It takes human analysts to find what’s not as obvious.
Protecting individuals and organizations from account takeover is a never-ending cat-and-mouse game and there is no single solution capable of making threats disappear. Criminals are clever and will keep inventing ways to steal from you, and on the whole, users will keep making mistakes that put their accounts at risk. As a corporate security team, you can’t defend yourself alone. ATO prevention requires users to own their online security alongside your cyber programs and policies. As part of a strong cyber program, you need strong partners that specialize in staying ahead of evolving ATO attacks.
If there is one tool everyone should have in their arsenal, it’s direct access to Recaptured Data. The ability to quickly identify compromised accounts, reset passwords, and block ATO from damaging your organization presents the rare thrill of beating attackers at their own game.
What can you do right now to protect yourself?
Discover how many breach and malware records we have associated with your email address and your domain as a whole, along with specific exposures that put your company at risk of account takeover and follow-on attacks like ransomware.
Check Your ATO Risk
Enter your business email to see your personal and domain-level exposure data.
Now that we have SpyCloud, we can protect hundreds of millions of people and prevent them from choosing passwords that have already been exposed.
Barry Abrahamson, CTO at Automattic
TECHNOLOGY
See Why Automattic Chose SpyCloud to Detect Its Users’ Account Exposures
SpyCloud Account Takeover Prevention Solutions
Consumer ATO Prevention
Protect your users from account takeover fraud and unauthorized purchases.
Identity Risk
Engine
Stop criminals from using stolen data to create false identities and commit fraud.
Session Identity Protection
Prevent criminals from using stolen cookies to bypass MFA and access consumer accounts.
Employee ATO Prevention
Protect your organization from breaches and BEC due to password reuse.
Prevent Account Takeover
