Identity
Time to see past the blind spots of account takeover

(Adobe Stock)
Few cybersecurity threats worry today’s CISOs as much as account takeover (ATO) attacks. As many major brands have come to learn the hard way, even the most robust security controls are easily undone by customers recycling their passwords across multiple accounts.Recent events underscore the critical need to address ATO vulnerabilities. Security researchers uncovered critical security flaws in ChatGPT plugins, exposing sensitive user data and raising concerns about the security of third-party integrations. Meanwhile, a recent surge in user complaints prompted U.S. state attorney generals to demand action from Meta regarding a "dramatic and persistent spike" in ATOs on Facebook and Instagram.Both of these incidents highlight the potential for ATO attacks to occur on traditional platforms like social media, and also within the expanding ecosystem of productivity tools and AI-powered applications.Learn the predictive signals: Is the ratio of failed login attempts versus successful ones outside the norm? Has someone recently published a configuration for the OpenBullet tool for the company’s site? These are just a few of the telltale indicators that an application is being targeted for an ATO attack. In addition to internal predictive signals, it’s likewise crucial to incorporate external indicators as well. Regularly monitoring dark web markets might reveal stolen credentials or user information being sold that attackers could use to launch ATO attacks. Additionally, tracking trends in cybercrime forums and social media discussions can highlight emerging attack techniques and tools targeting a specific industry or user base. By combining internal and external threat intelligence, the team can gain a more comprehensive picture of potential ATO threats and take proactive steps to defend users and applications from unauthorized access. Integrate signals to accelerate a response: Because the signals of an ATO are very diverse, they often reach different teams – each of which cannot see the big picture. This compartmentalization of signal detection leads to a significant gap in comprehensive threat awareness within the organization. Often, there’s no centralized way to piece together these disparate signals into a coherent picture of an ongoing ATO attack. As a result, organizations find themselves blindsided by such attacks, with the realization only dawning upon receiving complaints from affected customers. It's a common narrative among businesses, where ATO attacks persist undetected for months, underscoring the importance of integrating signals across different organizational silos to foster a more proactive and informed response mechanism. Deploy security controls: Just as a car thief is more likely to target a vehicle with fewer safeguards, most cybercriminals will likewise follow the path of least resistance. The more difficult and expensive the team makes it for the attacker, the better the chances of minimizing the damage. Multifactor authentication is the most obvious way to deter ATO attempts. Additionally, implementing rate limiting can further hinder bots by restricting the number of login attempts allowed within a specific timeframe, making it more time-consuming and resource-intensive for attackers to launch large-scale ATO attempts. While we can offer no real silver bullet for preventing ATO attacks, security teams can certainly reduce the chances by applying some of these ideas and work to beat the bots at their own game.Nick Rieniets, Field CTO, Kasada
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds