SlideShare a Scribd company logo
Data Security
What is Account Takeover
A brief introduction to web fraud
Data Security Account Takeover
What is account takeover?
1. A brief description
2. How attackers commit account takeover
3. Why it is so damaging
4. Prevention
5. Detection
2
Data Security Account Takeover
What is Account Takeover
Obtaining access to a legitimate
user‟s online account, often through
the theft of login credentials
Simple Description
3
Data Security Account Takeover
Top 3 Access Methods
1. Phishing or Spear Phishing
e.g. sending a highly targeted email purporting to be an IT
Department which directs the user to ‘update’ their password.
How attackers commit Account Takeover
4
Data Security Account Takeover
Top 3 Access Methods
2. Stolen details and „horizontal‟ login attempts
e.g. Stolen username and password lists obtained from other
websites’ database breaches. People often reuse their
passwords across all of their user accounts – attackers simply
test these known details horizontally.
How attackers commit Account Takeover
5
Data Security Account Takeover
Top 3 Access Methods
3. Man-in-the-middle attacks
e.g. an attacker creates a Wi-Fi hotspot which is identical to
the one used by the target company. Employee’s of that
company’s phones and computers will auto-connect to the Wi-
Fi, allowing the attacker to control all of their web-traffic,
harvest login details and collect ‘login cookies’ that tell the
website the user has successfully logged in and doesn’t need
to re-enter their password.
How attackers commit Account Takeover
6
Data Security Account Takeover
Why Account Takeover is So
Damaging
1. Hard to detect
It can be carried out without the user or administrators knowledge or
mistake.
2. Targeted
Using LinkedIn to target specific employees, attackers are able to gain
access to nearly any computer system – such as the corporate website or
database.
3. Identity Theft
Once they have access, it is very easy for attackers to assume the real
users identity. In a corporate setting then can create new user accounts for
themselves through self-service portals, steal private information or move
funds. In a consumer setting – resetting all the user’s passwords and
spending against their credit cards 7
Data Security Account Takeover
Preventing Account Takeover
Prevention is only one half of the solution
1. Consider “one-time passwords”
mitigates against password reuse and phishing attacks.
2. Use HTTPs where possible.
Consumer websites such as Facebook and Gmail have the option to
enforce this. HTTPs reduces the chances of your password being stolen
over public Wi-Fi (or anyone on your network)
3. Improve Wi-Fi Security
Turn off Wi-Fi auto-connect on laptops and phones. For company devices,
consider requiring VPN (with one-time passwords) to login to corporate
accounts
8
Data Security Account Takeover
Detecting Account Takeover
Detection is required – if somebody‟s one time password generator is
stolen, they are still open to Account Takeover
 Be aware of user‟s behavior, ethically.
Have they started to interact with your web service in a different manner
than usual? e.g. from a different country, using a non-corporate operating
system?
 Dynamic authentication.
Understand the risk of an action and the security surrounding this. E.g.
What is the risk of allowing a user to download the full client database?
Should a secondary security check be required, such as a phone-call to
verify the user? There are off-the-shelf, configurable products such as
NuDetect which do this.
9

More Related Content

What's hot

IoT and Alexa in the connected home
IoT and Alexa in the connected homeIoT and Alexa in the connected home
IoT and Alexa in the connected home
Amazon Web Services
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
Shishupal Nagar
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 
Ip trace ppt
Ip trace pptIp trace ppt
Ip trace ppt
deepakmarndi
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
priya_kp03
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
Faruk_Hossen
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
Akmal Hussain
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
Hema Sharma
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
Tripwire
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
Data Unit
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Network Security
Network SecurityNetwork Security
Network Security
Raymond Jose
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
MarketingArrowECS_CZ
 
Firewall
FirewallFirewall
Firewall
sajeena81
 

What's hot (20)

IoT and Alexa in the connected home
IoT and Alexa in the connected homeIoT and Alexa in the connected home
IoT and Alexa in the connected home
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Ip trace ppt
Ip trace pptIp trace ppt
Ip trace ppt
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Network Security
Network SecurityNetwork Security
Network Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Firewall
FirewallFirewall
Firewall
 

Similar to What is Account Takeover - An Introduction to Web Fraud

Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Journals
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
eSAT Publishing House
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
Neeraj Negi
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
GIRISHKUMARBC1
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
prashanth73488
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
Anne ndolo
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
Mohit Kanwar
 
internet security
internet securityinternet security
internet security
Cheryl Tanicala-Roldan
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication VulnerabilityHow to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
AshKhan85
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
IRJET Journal
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
Anvesh Vision Private Limited
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
David J Rosenthal
 
Phishing
PhishingPhishing
Phishing
Arpit Patel
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PiedadCES
 

Similar to What is Account Takeover - An Introduction to Web Fraud (20)

Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
 
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
internet security
internet securityinternet security
internet security
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication VulnerabilityHow to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Phishing
PhishingPhishing
Phishing
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

What is Account Takeover - An Introduction to Web Fraud

  • 1. Data Security What is Account Takeover A brief introduction to web fraud
  • 2. Data Security Account Takeover What is account takeover? 1. A brief description 2. How attackers commit account takeover 3. Why it is so damaging 4. Prevention 5. Detection 2
  • 3. Data Security Account Takeover What is Account Takeover Obtaining access to a legitimate user‟s online account, often through the theft of login credentials Simple Description 3
  • 4. Data Security Account Takeover Top 3 Access Methods 1. Phishing or Spear Phishing e.g. sending a highly targeted email purporting to be an IT Department which directs the user to ‘update’ their password. How attackers commit Account Takeover 4
  • 5. Data Security Account Takeover Top 3 Access Methods 2. Stolen details and „horizontal‟ login attempts e.g. Stolen username and password lists obtained from other websites’ database breaches. People often reuse their passwords across all of their user accounts – attackers simply test these known details horizontally. How attackers commit Account Takeover 5
  • 6. Data Security Account Takeover Top 3 Access Methods 3. Man-in-the-middle attacks e.g. an attacker creates a Wi-Fi hotspot which is identical to the one used by the target company. Employee’s of that company’s phones and computers will auto-connect to the Wi- Fi, allowing the attacker to control all of their web-traffic, harvest login details and collect ‘login cookies’ that tell the website the user has successfully logged in and doesn’t need to re-enter their password. How attackers commit Account Takeover 6
  • 7. Data Security Account Takeover Why Account Takeover is So Damaging 1. Hard to detect It can be carried out without the user or administrators knowledge or mistake. 2. Targeted Using LinkedIn to target specific employees, attackers are able to gain access to nearly any computer system – such as the corporate website or database. 3. Identity Theft Once they have access, it is very easy for attackers to assume the real users identity. In a corporate setting then can create new user accounts for themselves through self-service portals, steal private information or move funds. In a consumer setting – resetting all the user’s passwords and spending against their credit cards 7
  • 8. Data Security Account Takeover Preventing Account Takeover Prevention is only one half of the solution 1. Consider “one-time passwords” mitigates against password reuse and phishing attacks. 2. Use HTTPs where possible. Consumer websites such as Facebook and Gmail have the option to enforce this. HTTPs reduces the chances of your password being stolen over public Wi-Fi (or anyone on your network) 3. Improve Wi-Fi Security Turn off Wi-Fi auto-connect on laptops and phones. For company devices, consider requiring VPN (with one-time passwords) to login to corporate accounts 8
  • 9. Data Security Account Takeover Detecting Account Takeover Detection is required – if somebody‟s one time password generator is stolen, they are still open to Account Takeover  Be aware of user‟s behavior, ethically. Have they started to interact with your web service in a different manner than usual? e.g. from a different country, using a non-corporate operating system?  Dynamic authentication. Understand the risk of an action and the security surrounding this. E.g. What is the risk of allowing a user to download the full client database? Should a secondary security check be required, such as a phone-call to verify the user? There are off-the-shelf, configurable products such as NuDetect which do this. 9