Cloud Security
Account takeover (ATO) allows the attacker to gain access to the data and privileges associated with the compromised account. Often, the hacker will use an account breach to obtain access to additional accounts. This lateral movement to related accounts can be difficult to detect.
The hacker usually gains access to a user’s account through social engineering exploits. This could be a phishing exploit where an account owner is tricked into disclosing login credentials with a deceptive email or website form or online form. Or the attacker could employ baiting where the victim is enticed with a reward to review account details.
Both private and corporate accounts can be targets of ATO attacks, however often for very different reasons.
Personal ATOs may be carried out to gain access to a user’s financial accounts, resulting in fraudulent transactions, or to gain access to a target organization’s network.
ATO can be the perfect launching point for an attack on a private or government organization. Cybercriminals seek the most vulnerable entry points to the target organization and strategize their next move from there.
In the past, account takeovers typically occurred when a hacker would gain access to the account by guessing the credentials, using brute force to obtain the credentials, or breaking into an account the intruder has previously gotten into. Usually, this form of account takeover could be prevented by multi factor authentication (MFA). However, MFA is no longer enough to prevent modern day account takeovers. Hijackers now smartly trick account owners into downloading a software, clicking a sinister link, and more. This allows hijackers to hack the account and gain access without ever needing the user’s credentials. These modern account takeovers are harder to correct or prevent because the hacker has access to the network the account is on, not just the user credentials.
Corporate Account Takeover (CATO) is a type of ATO where the targeted account belongs to a business. The attacker may use the compromised account to authorize fraudulent financial transactions, add fake employees to payroll or exfiltrate sensitive data. Cybercriminals often obtain credentials to corporate accounts by targeting employees with phishing attacks, phone scams or malware.
Private users can prevent ATO by implementing the following precautions:
Multi-factor authentication (MFA) was once the most common way to secure data and prevent account takeovers. However, MFA is no longer sufficient to prevent CATO and must be supplemented with cybersecurity software to hunt and respond to account takeover threats.
Currently, account takeovers have become the largest security threat vector in the cloud. In fact, 30% of organizations suffer account takeovers every month, even with multi-factor authentication in place. Vectra’s AI powered network detection and response platform, Cognito, finds and stops cyber threats inside the cloud to protect your network from sinister attackers.
Discover how cybercriminals use legitimate Office 365 services to launch attacks.
New survey reveals 71% of companies suffer an average of 7 account takeovers.
Learn how Greenhill stops privilege escalation and account takeovers in Office 365.
General: info@vectra.ai
Support: support@vectra.ai
Headquarters
550 S. Winchester Blvd., Suite 200
San Jose, CA, USA 95128
© 2022 Vectra AI, Inc. All rights reserved.