

Consumer Technology Topic of the Month
Account Takeover Attack is a type of identity theft that occurs when a cybercriminal gains access to your online account and changes your login credentials to lock you out. Once you cannot log back in, a cybercriminal will use your identity to steal private information or even scam others. You can prevent account takeover attacks by using strong passwords, enabling Multi-Factor Authentication (MFA) and investing in dark web monitoring. According to a recent report, over 77 million adults have experienced account takeovers, with social media accounts being the most hacked.
What makes account takeovers so dangerous?
Account takeovers are very dangerous for individuals and organizations because they can lead to:
- Stolen personal information
- Loss of money
- Vulnerability to identity theft
- Damaged reputation
- Compromised data
If a cybercriminal accesses an online account containing personal or customer information, they could use what they find to log in to additional accounts or sell the data to other cybercriminals on the dark web. Because an account takeover locks the victim out of their account, it becomes difficult for a person or company to regain access, retrieve data, recover finances, and repair their reputation.
How individuals can prevent account takeovers
As an individual, you can protect your information and prevent your account from being taken over by following these tips.
Use strong passwords for every account
Create a strong and unique password for each of your online accounts. A strong password contains over 16 characters and a combination of uppercase and lowercase letters, numbers and symbols. The longer and more random a password is, the more protected your account will be from cyber-attacks. When creating a strong password, avoid using common words or phrases, personal information or sequential numbers.
Enable Multi-Factor Authentication (MFA) whenever it’s available
Multi-Factor Authentication (MFA) is an additional security measure that requires users to provide extra proof of identity beyond a username and password. When you enable MFA, you are required to enter additional verification like a PIN, a code from an authenticator app or your fingerprint. Enabling MFA makes it much harder for cybercriminals to access your accounts since it will require them not only to know your username and password but also an additional way to prove your identity – which only you should have access to.
Learn to spot phishing attempts
Many account takeovers result from people falling for phishing attacks. Phishing occurs when a cybercriminal impersonates a person or company the victim knows to persuade them into sharing private information. Most phishing attempts use urgent language, persuading you to act quickly or threatening you if you don’t follow instructions immediately. Often, phishing messages contain spelling and grammatical errors, which you should be able to spot easily, knowing that most companies review emails multiple times before sending them. Check the sender’s email address to verify that the domain matches a reputable company before believing the sender’s identity.
Never click unsolicited links or attachments
If you ever receive an unsolicited email or text message that contains links or attachments, do not click on or download them. Even if a message appears to come from a company with which you have an account, you should go to the official company’s website or app and log in to your account that way instead. An unsolicited link or attachment could contain malware designed by a cybercriminal to steal your private data once installed onto your device.
You can check if a link is safe by hovering over the link, which will give you a preview of the URL, or copying and pasting the link into a URL checker. Check that an email attachment is safe by double-checking the sender’s email address and using antivirus software to scan any attachments.
Use a dark web monitoring tool
You can use a dark web monitoring tool to see if your personal information is on the dark web as part of the internet where cybercriminals can buy and sell any information obtained through malicious activities.
How organizations can prevent account takeovers
There are several ways you and your organization can prevent account takeovers from compromising data and damaging your company’s reputation.
Employing a business password manager
If your organization is not already using a business password manager, this is your sign to start. A business password manager allows your employees to manage and store their passwords safely in a digital vault. Requiring employees to use a password manager within your company ensures they follow best password practices. A business password manager also allows employees to securely share encrypted passwords to collaborate safely. This ensures that passwords are not intercepted by unauthorized users and that login credentials remain secure in each employee’s encrypted digital vault. Password managers can also help enforce MFA by storing MFA codes within a record and auto filling them when a user needs to enter an MFA code on a website or account. Business password managers make storing and sharing passwords secure and convenient for any employee and organization.
Invest in Dark Web Monitoring
Your organization should invest in dark web monitoring to prevent account takeovers. Manager that constantly checks the dark web to see if any records stored in employee vaults match those on the dark web.
Limit the number of login attempts
Set a limit on how many login attempts someone can make to try and access their account. Brute force attacks occur when a cybercriminal guesses login credentials through trial and error, so if someone is given unlimited login attempts, they might eventually access an employee’s account. Since brute force attacks rely on multiple login attempts, limiting the number of attempts to three or four guesses will give employees enough tries in case they made a typo but will prevent potential cybercriminals from accessing an account.
Set up a Web Application Firewall (WAF)
Your organization can set up a Web Application Firewall (WAF), which helps filter traffic between a web application and the internet. By using WAF, your organization is protecting any web applications from potential cyber-attacks, including account takeovers. WAFs identify and block requests from unauthorized traffic and can even detect when cybercriminals’ bots are trying to infiltrate your accounts.
Implement zero trust
Zero Trust is a security framework that assumes every device and account is capable of being compromised. To combat this, every user – both human and machine – needs to constantly verify their identity within an organization through multiple authentication processes. The three core principles of zero trust are to assume breaches will happen, require everyone to verify their identity to access the organization’s network and data and ensure users have least-privilege access. All employee devices used on an organization’s network should be registered and managed to keep track of who is allowed access.
An important aspect of zero-trust solutions is least privileged access which grants employees only the access necessary to do their jobs, thereby helping prevent a data breach from spreading. That way, if one employee’s account is taken over, their limited access will not give cybercriminals as much access to the rest of the organization. For example, if an employee whose account was taken over had access to not only marketing data but also customer information, transactions and social media accounts, the cybercriminal would have access to much more valuable data.
Educating employees on security awareness
Make your employees aware of potential security risks and threats by running phishing tests, which are simulated phishing emails sent company-wide to see how employees react. These tests can help you determine if your organization is prepared for phishing attacks or if employees need further training on security measures. Educating your employees about security threats will protect you and your organization from cyber-attacks in the future.
- ONLY SCAMMERS DEMAND PAYMENT IN CRYPTOCURRENCY. No legitimate business is going to demand you send cryptocurrency in advance- not to buy something, and not to protect your money. That's always a scam.
- ONLY SCAMMERS WILL GUARANTEE PROFITS OR BIG RETURNS. Don't trust people who promise you can quickly and easily make money in the crypto markets.
- NEVER MIX ONLINE DATING AND INVESTMENT ADVICE. If you meet someone on a dating site or app, and they want to show you how to invest in crypto, or asks you to send them crypto, that's a scam.
- A so-called "investment manager" contacts you out of the blue. They promise to grow your money- but only if you buy cryptocurrency and transfer it into their online account. The investment website they steer you to looks real, but it's a fake, and so are their promises. If you log in to your "investment account", you won't be able to withdraw your money at all, or only if you pay high fees.
- An online "love interest" wants you to send money or cryptocurrency to help you invest. That's a scam. As soon as someone you meet on a dating app asks you for money, or offers you investment advice advice, know this: that's a scammer. The advice and offers to help you invest in cryptocurrency are nothing but scams. If you send them crypto, or money of any kind, it'll be gone, and you typically won't get it back.
- Scammers guarantee that you'll make money or promise big payouts with guaranteed returns. Nobody can make those guarantees. Much less in a short time. And there's nothing "low risk" about cryptocurrency investments. So: if a company or person promises you'll make a profit, that's a scam. Even if there's a celebrity endorsement or testimonials from happy investors. Those are easily faked.
- Scammers promise free money. They'll promise free cash or cryptocurrency, but free money promises are always fake.
- Scammers make big claims without details or explanations. No matter what the investment, find out how it works and ask questions about where your money is going. Honest investment managers or advisors want to share that information and will back it up with details.
- IF YOU SEE A TWEET ( OR A TEXT, OR OTHER MESSAGE ON SOCIAL MEDIA) THAT TELLS YOU TO PAY WITH CRYPTOCURRENCY, THAT'S A SCAM!
Tips to Avoid Identity Theft
The best protection against identity theft is to carefully guard your personal information. For example:
- Do not share personal information over the phone, through the mail, or over the internet unless you initiate contact or know the person you are dealing with.
- Be suspicious if someone contacts you unexpectedly online and asks for your personal information. It doesn’t matter how legitimate email or website may look. Only open emails from people or organizations you know and, even then, be cautious if they look questionable. Be especially wary of fraudulent emails or websites that have typos or other obvious mistakes.
- Don’t give out personal information in response to unsolicited requests. Be particularly careful about to whom you give your Social Security number, financial account information, and driver’s license number.
- Shred old receipts, account statements, and unused credit card offers.
- Choose PINs and passwords that would be difficult to guess and avoid using easily identifiable information, such as your mother’s maiden name, birth dates, the last four digits of your social security number, or phone numbers.
- Pay attention to billing cycles and account statements and contact your bank if you don’t receive a monthly bill or statement. Identity thieves often divert account documentation.
- Review account statements thoroughly to ensure all transactions are authorized.
- Guard your mail from theft, promptly remove incoming mail, and do not leave bill payment envelopes in your mailbox with the flag up for pick up by mail carrier.
- Obtain your free credit report annually and review your credit history to ensure it is accurate.
- Use an updated security program to protect your computer.
- Be careful about where and how you conduct financial transactions. For example, don’t use an unsecured Wi-Fi network because someone might be able to access the information you are transmitting or viewing
Tips to Avoid Frauds and Scams
Consumers should always exercise caution when it comes to their personal and financial information. The following tips may help prevent you from becoming a fraud victim.
- Be aware of incoming email or text messages that ask you to click on a link because the link may install malware that allows thieves to spy on your computer and gain access to your information.
- Be suspicious of any email or phone requests to update or verify your personal information because a legitimate organization would not solicit updates in an unsecured manner for information it already has.
- Confirm a message is legitimate by contacting the sender (it is best to look up the sender’s contact information yourself instead of using contact information in the message).
- Assume any offer that seems too good to be true, is probably a fraud.
- Be on guard against fraudulent checks, cashier’s checks, money orders, or electronic fund transfers sent to you with requests for you to wire back part of the money.
- Be wary of unsolicited offers that require you to act fast.
- Check your security settings on social network sites. Make sure they block out people who you don’t want to see your page.
- Research any “apps” before downloading and don’t assume an “app” is legitimate just because it resembles the name of your bank or other company you are familiar with.
- Be wary of any offers that pressure you to send funds quickly by wire transfer or involve another party who insists on secrecy.
- Beware of disaster-related financial scams. Con artists take advantage of people after catastrophic events by claiming to be from legitimate charitable organizations when, in fact, they are attempting to steal money or valuable personal information.
- A cyber criminal manipulates the account owner into giving away their login credentials, including multi-factor authentication (MFA) code or One-Time Passcode (OTP), by impersonating a financial institution employee, customer support, or technical support personnel. The cyber criminal then uses login credentials to log into the legitimate financial institution website and initiate a password reset, ultimately gaining full control of the accounts.
- Social engineering methods include contacting account owners via fraudulent text messages, calls, or emails to trick the email recipient into providing their login credentials. In some instances, the cyber criminal states there are fraudulent transactions on the financial account and may link to a phishing website that the account owner believes will report the fraud or prevent additional fraudulent transactions.
- In some instances, cyber criminals impersonating financial institutions reported to the account owner that their account information was used to make fraudulent purchases , including firearms The cyber criminal convinces the account owner to provide information to a second cyber criminal impersonating law enforcement, who then convinces the account owner to provide account information.
- The cyber criminal uses a phishing website that looks like the legitimate online financial institution or payroll website to trick the account owner into giving away their login credentials. Believing the phishing website is the legitimate one, users enter their login credentials into the fraudulent site, unknowingly providing them to cyber criminals.
- Cyber criminals may also use a technique called Search Engine Optimization (SEO) poisoning. SEO poisoning refers to cyber criminals purchasing ads that imitate legitimate business ads to increase the prominence of their phishing websites by making them appear more authentic to customers who use a search engine to locate the business' website. When users click on the fraudulent search engine ad, they are directed to a sophisticated fraudulent phishing site that mimics the real website, tricking users into providing their login information.
- Be careful about the information you share online or on social media. By openly sharing information like a pet's name, schools you have attended, your date of birth, or information about your family members, you may give the scammers information they need to guess your password or answer your security questions.
- Monitor your financial accounts on a regular basis. Watch for irregularities, such as missing deposits or unauthorized withdrawals, wire transfers, or expenditures.
- Always use unique, complex passwords. Enable two-factor authentication or MFA on any account possible. Never disable it.
- Use Bookmarks or Favorites for navigating to login websites. Avoid clicking on Internet search results or advertisements. MFA will not protect you if you land on a fraudulent login page. Carefully examine any email address, URL, or spelling in unsolicited correspondence.
- Stay vigilant against phishing attempts. Be suspicious of unknown "banking" or "company" employees wo call you; don't trust caller ID. Hang up, verify the correct number and call it yourself. Companies generally do not contact you to ask for your username, password, or OTP.
- Contact Your Financial Institution-Contact your financial institution as soon as Fraud is recognized to request a recall or reversal.
- Reset or Revoke Compromised Credentials- Reset all credentials and passwords that may have been exposed during the intrusion, including user and service accounts, compromised certificates, or other "secret" credentials. If you use the compromised password for other online accounts, change your password on those sites too.
- Notify the Impersonated Company- Notify the company that was impersonated of the method the cyber criminals used to target the account owner The company may be able to warn others to watch out for the scam and take proactive measures like requesting phishing pages be taken down.
- Verify suspicious account activity
- Track or reschedule a "missed" delivery
- Confirm your shipping address or other personally identifiable information
- Respond with "yes" or call the sender back
- Pay unpaid taxes or bills
- Claim a refund, prize, or reward
- Obtaining the victim's contact details. Most of the time, these can be looked up online on public data brokers and people-search websites, but many scammers go to great lengths to buy leaked datasets on real people from dark web websites.
- Impersonating trusted institutions or people. Scammers carefully choose whom to impersonate to sound credible. These include banks, government agencies, postal services, or even your employer or business partner.
- Creating urgency. Smishing messages mimic official and urgent communication from authorized senders that cant be easily ignored and demand prompt action, for example, "Your account will be locked unless you verify immediately".
- Include a malicious link or phone number to call back. These are used to take the victim to spoofed websites and "call centers" that steal sensitive information, such as payment card details and digital account credentials, or to download malware to the victim's device.
- Requesting personal information. Whether on a malicious website or on the phone with the scammer, you'll be required to enter or share your personal information under credible excuses. Once you do this, these details will be stolen and potentially exploited for the scammer's financial gain.
- Monetization- The ultimate stage of a smishing attack where scammers exploit your information- withdraw money from your bank account, make fraudulent purchases, commit identity theft, or sell the data to other scammers.
- Verify information independently. For example, if you get a fraud alert from your bank, contact the phone number on the back of your payment card to verify if it was compromised.
- Keep your phone updated and enable spam filters. Install the latest security patches to make sure no software loophole can be exploited by scammers. Many smartphones and carriers support spam filters that can block smishing text automatically.
- Never respond to texts with your personal information, be it PINs, one-time verification codes, credit card data, or account credentials.
- Report suspicious texts to your carrier and/or local regulatory and anti-frau d bodies so they can maintain an up-to-date database of scammers' phone numbers and domains.
- Stop interacting with the text, don't click any links or reply.
- Take a screenshot of the text and the sender's ID for further scam reporting.
- Block the sender and report the text as spam by copying and forwarding it to 7726 (SPAM), then delete the message.
- If you clicked the link in the smishing message and entered your credentials, change them for all the affected accounts, including reused passwords.
- If you shared your financial details or banking account login with the scammers, contact your bank to set up fraud alerts and disable and reissue any affected payment cards.
- If you sent money to the scammers, you may be able to dispute the transaction as fraudulent.
- In case the smishing text impersonates a real company, you may contact this company directly and file an impersonation report with them.
- If your personal data has been stolen, monitor your bank account, email, and credit card for suspicious activity.
- Run a trusted antivirus to detect any potential malware that could have been installed on your device.
- Receive credit cards that you did not apply for.
- Find unauthorized charges on your bank or credit card statements.
- Receive bills or collection letters from companies that you never heard of or for accounts you don't recognize.
- Receive rejection letters for loans that you never heard of or for accounts you don't recognize.
- Receive notices reflecting that you traveled to, lived in or did business in a jurisdiction to which you have no connections.
- Get calls from debt collectors or businesses about merchandise or services you did not buy.
- Fail to receive your bills or regular mail. (The ID thief may have changed your billing address)
- Receive unexpected notices from the IRS about failing to report all your income or informing you that they received more than one income tax return in your name.
- Call or email the fraud department of the companies, banks or credit unions where accounts have been compromised. Explain that someone stole our identity and ask them to close or freeze the compromised account.
- Contact any of the three credit reporting agencies and ask that a free fraud alert be placed on your credit report. Also ask for a free credit report. You only need to contact one of the three agencies because law requires he agency you call to contact the other two.
- Equifax
- Experian
- TransUnion
- Change the passwords, pin numbers, and log in information for all of your potentially affected accounts, including your email account, and any accounts that use the same password, pin, or log in information.
- Contact your police department, report the crime and obtain a police report.
- Go to the webpage of the Federal Trade Commission, report the ID theft and create an identity theft recovery plan.
- Decide whether you want to place a security freeze on your credit report.
- Review your credit report to correct any errors and identify any new accounts that were opened in your name, and then contact the business and close those accounts and inform the credit bureau that you did not open those accounts.
- Review your other credit card and bank statements and take action to remove or dispute unauthorized charges or debits.
- Consider other steps you may need to take to address specific problems such as reporting a misused Social Security number.
- Consider a court order to assist you in clearing your name.
- Bank/Zelle Impersonation: Scammers contact individuals via text or email, claiming to be from their bank or Zelle, often stating there's a problem with their account or fraudulent transaction. They might even spoof the financial institution's phone number.
- Family/Friend Impersonation: Scammers pretend to be friends or family members, claiming to be in an urgent situation and asking for immediate Zelle money transfers.
- Government/Authority Impersonation: Fraudsters impersonate government agencies like the IRS or law enforcement, demanding Zelle payments to resolve issues like alleged fines or threats of arrest.
- Business /Company Impersonation: Scammers pose as businesses, such as utility companies, threatening service disruption and demanding payment via Zelle.
- Phishing Links: Scammers send fake links via email or text, mimicking legitimate bank or Zelle login pages. If a user enters their credentials, the scammer gains access to their account and can initiate Zelle transfers.
- One-Time Code Exploitation: Scammers might ask for a user's one-time code sent to their phone, which they then use to link their own bank account tho the user's Zelle account and steal funds.
- Fake Listings: Scammers post fake listings on platforms like Facebook Marketplace or online classifieds, tricking users into sending Zelle payments for goods, services, or rental properties that don't exist.
- Overpayment/Advance Payment: Scammers might send a large, unsolicited Zelle payment and then ask the recipient to return the difference, potentially involving stolen fuds or initiating an "account upgrade" scam.
- Fake Rental Deposits: Scammers posing as landlords demand Zelle deposits for rental properties, especially in competitive markets.
- Refund Scams: Scammers impersonate Zelle agents, claiming a fraudulent transaction occurred and tricking the user into sending money as part of a fake refund process.
- Money Mule Scams: Scammers target jobseekers with fake work-from-home offers, instructing them to deposit fraudulent checks and then use Zelle to send funds to purchase equipment, unknowingly turning them into money mules.
- Treat Zelle like cash: Only send money to people you know and trust, and once the the money is sent, it's difficult to recover.
- Be wary of unsolicited requests: Don't respond to unexpected emails, texts, or phone calls, especially those demanding immediate action or payments.
- Verify the recipient: Double-check the recipient's information before sending any money.
- Never share sensitive information: Don't share your login credentials, PIN, or one-time passcode with anyone, even if they claim to be from your bank or Zelle.
- Access Zelle through official channels; Use your bank's official app or website to access Zelle, not external links
- Report suspicious activity. If you encounter a potential scam, report it to Zelle and your bank immediately.