What is Account Takeover (ATO) Fraud? How to Detect & Prevent ATO

Oct 15, 2024
-minute read
Headshot of Maya Ogranovitch Scott Ping Identitys Solutions Architect
Senior Product & Solutions Marketing Manager

Key Takeaways

 

  • Account takeover fraud surged by 354% in the past year, with 62% of incidents occurring in just the last 12 months. This explosive rise poses a massive threat to industries like e-commerce, finance, and social media.
  • E-commerce is a prime target, as stolen accounts allow fraudsters to access sensitive information, complete unauthorized purchases, and leverage stored payment data—leaving businesses and customers equally vulnerable.
  • Identity theft costs businesses and individuals an average of $12,000 per incident, with 34% of victims defrauded multiple times. These numbers are only expected to rise as online fraud becomes more sophisticated.
  • AI is a double-edged sword in the fight against fraud—it empowers cybercriminals with more advanced phishing schemes and identity fakes while also helping businesses build more effective, predictive fraud detection tools.
  • Most consumers (73%) hold brands accountable for preventing ATO fraud on their platforms, yet less than half of affected users are notified when their accounts are compromised. Brands are under pressure to protect accounts and build consumer trust.

What is Account Takeover Fraud?

Account takeover fraud (ATO) is a form of identity theft where fraudsters overtake an online account and pose as real users. Typical means for ATO include compromised credentials, session-hijacking, social engineering, and device takeover.

 

For example, ecommerce sites are common targets for ATO fraudsters for a variety of reasons, including the fact that quite a lot of sensitive and financial data are stored there, and yet individual users may be less vigilant with their security than in some other verticals. Once bad actors gain access to an ecommerce account, they can make purchases with the card on file, but they can also view sensitive personal data such as credit card numbers, home addresses, phone numbers, and email addresses. Not only does this example show how an ecommerce platform can be damaged by ATO, but it also highlights how ATO is used for identity theft. Similarly, a bad actor may seek access to an online banking portal in order to transfer funds or to harvest enough PII to use elsewhere – for example, at another financial institution to apply for a loan under a stolen identity.

 

ATO is a problem in most industries that do business online. The following industries are especially common targets for ATO:

 

  • Financial services
  • Online retail & ecommerce
  • Healthcare
  • Social media
  • Video streaming & entertainment
  • Online gaming
  • Utilities

 

Common ATO Red Flags

 

  • Odd Login Behavior: Logins from new devices, new locations, new times, or anything outside of previous common behavior is considered a red flag.
  • Large Number of Failed Login Attempts: When multiple login attempts occur in a short period of time, this may indicate a brute force attack, which involves repetitive attempts to “guess” a password based on minimal pieces of PII.
  • Login Spikes: Bots are commonly used to flood the system, similar to a brute force attack.
  • Account Detail Changes: If there are changes to an account’s preferred email, phone number, or security/account recovery details, especially all at once, this can indicate an ATO.
  • Suspicious Activity: High volumes of chargebacks or purchases from new locations should be considered suspicious.

 

Account Takeover Fraud Statistics

 

Credential stuffing tools, password cracking tools, phishing and social engineering schemes, combined with personal identifiable information (PII) available on the dark web, make account takeover attacks a common fraud technique. According to research by Sift’s Q3 2023 Digital Safety and Trust Index, ATO attacks are on the rise, jumping an eye-popping 354% year-over-year. Nearly one-fifth (18%) of those surveyed have experienced account takeover attacks, with 62% of those taking place in the past year. Over 34% of victims were defrauded 2+ times, typically while using sites or apps for digital subscriptions, online shopping, and financial services. To make matters worse, global fraud losses are projected to be 20% higher than they were last year, and set to cost merchants and consumers billions by the close of 2023.

In 2023, ATO continues to be an ecommerce fraud that threatens online marketplaces, increasing by 131% compared to the second half of 2022.

 

Ecommerce fraud trends and statistics merchants need to know in 2024

 

Furthermore, according to Sift’s research, most consumers (73%) believe the brand is accountable for ATO attacks and responsible for protecting account credentials; while fewer than half (43%) of account takeover victims were notified by the company that their information had been compromised. With the responsibility for sensitive information falling on brands, ATO prevention must be taken seriously.

Impact of ATO Fraud

ATO fraud isn't limited to personal accounts. The FBI recently announced that $50 billion has been lost in both domestic and international business email compromise. This is a $7 billion increase from 2022. From December 2021 to 2022 alone, there was a 17% increase in reported global losses to BEC. With this form of account takeover, the fraudster gains access to a business's email account and makes unauthorized fund transfers.

 

  • Financial losses: Unauthorized transactions, fund transfers, and access to linked accounts using pilfered login credentials can lead to substantial financial setbacks for individuals and businesses. According to a Security.org study, the average financial losses resulting from Account Takeover (ATO) incidents amount to approximately $12,000. Additionally, businesses may incur costs associated with disputing and processing chargebacks stemming from fraudulent transactions caused by ATO attacks
  • Identity theft: Personal information theft, including social security numbers, credit card details, and login credentials, exposes individuals to the risk of identity theft. The aftermath can entail significant monetary losses and diminished credit scores.
  • Reputational damage: Businesses grappling with ATO fraud may suffer reputational damage potentially resulting in customer loss and revenue decline.
  • Negative impact on user experience: ATO attacks can also impact user experience and brand image. For example, eCommerce firms must safeguard user accounts to avoid negative repercussions such as fraudulent transactions, payment fraud, user mistrust, and damage to brand reputation.

How does Account Takeover Happen?

Account takeover is completed through a series of steps:

 

  1. The fraudster gains access to victims' accounts, typically using compromised credentials.
  2. The fraudster starts with small, non-monetary changes to account details, such as:

    • Modifying personally identifiable information (PII)
    • Requesting a new card
    • Adding an authorized user
    • Changing the password

  3. These activities are regular occurrences, so they are harder to detect as fraudulent.

  4. After one or more of the changes is successfully completed, the fraudster is free to continue with financial and other transactions. Victims' accounts may include saved payment information, additional PII or rewards points that provide useful data for money transfers, large purchases, taking out loans in victims' names and taking over more accounts. The more information the fraudster can gather, the easier it becomes to access more of the victim's accounts and services.

Graphic showcasing some of the different ways fraudsters try to hack accounts including Mobile app stock trading loyalty program api gateway and banking website

Real-world Account Takeover Fraud Examples

Account takeover fraud is common across industries and can stay hidden for months, allowing criminals to act undetected. The following are a few of the areas where account takeover fraud is common:

 

Financial gain targets: Banking, credit cards, e-commerce sites, and businesses where stolen credentials lead to payouts.

 

  • Attackers often transfer funds or make purchases, including resellable gift cards, making these actions hard to trace.
  • In 2021, losses from account takeovers in e-commerce reached $11.4 billion due to fraud from stolen credentials.

Other motivations: Gaining data on family, friends, or colleagues for future attacks, extorting sensitive information like healthcare data, or harming reputations via social media.

 

  • High-profile social media hacks are often detected quickly; in 2016, Katy Perry’s Twitter account, with 89 million followers, was hacked and used to post slurs and redirect followers.
  • Healthcare data breaches surged, with the average cost of a healthcare data breach reaching $9.2 million in 2021.

Creative approaches: Fraudsters may hijack accounts on booking platforms, like Airbnb, to book trips.

 

  • Victims often notice only when reviewing credit card bills, and they may be locked out of accounts while the fraud continues.
  • Airbnb saw an increase in fraud reports, with 1 in 5 consumers targeted by account takeovers on travel and booking platforms in 2022.

 

How to Defend Against Account Takeover Tactics

Account Takeover Fraud Methods

There are numerous methods a bad actor can use to get the credentials needed for account takeover, in addition to data breaches or buying them on the dark web. Account takeover fraud methods include:

 

Phishing

Phishing schemes, often conducted via email or text, are designed to get victims to provide account information to fraudsters. This type of social engineering is characterized by tricking victims by impersonating legitimate organizations, like government agencies and banks, or victims' family and friends. We've all gotten emails or texts from "banks" saying our accounts are locked and we need to provide login information for account recovery. Or "friends" who ask us to click on a link, which will install spyware or other malware on our computer or mobile device. Victims who unknowingly fall for these types of fraud provide bad actors with easy access to their accounts.

 

Phishing goes beyond these classic schemes and continues to evolve with the help of AI-assisted tools. Recent advanced phishing tools apply the more advanced Adversary In The Middle (AITM) attack, which is even resistant to some MFA methods such as OTP.

 

Phone Scams

Seniors are often the target of phone scams, since they may have listed phone numbers, own a home and have savings and good credit. Seniors with dementia or other challenges are at higher risk of fraudsters repeatedly taking advantage of them. This form of social engineering is perpetrated by scammers pretending to be tech support in need of access to the victim's computer or a grandchild who needs banking information in order to transfer funds for an emergency. The FBI estimates elder fraud results in $3 billion in losses annually.

 

Unsecure WiFi

Personal WiFi needs to be secure, which may require changes to default settings. The same is true of security settings on Internet of Things (IoT) devices that use WiFi, like doorbell, thermostat and garage door apps, which can be hacked and allow access to a network. Public WiFi should never be used for anything important, especially when it involves logging into accounts. A bad actor can set up a man-in-the-middle attack by creating a fake wireless access point in a public location, like a coffee shop, and use it to intercept your internet activity.

 

Credential Stuffing / Password Cracking / Brute Force Attacks

Credential stuffing uses bots to test compromised credential combinations on multiple websites or apps to access accounts. Password cracking tools automate the use of leaked or stolen usernames with dictionaries of common passwords, sometimes supplemented with custom dictionaries, to access accounts. Brute force attacks are a popular cracking technique that involve trying different variations of symbols or words until the correct password is figured out.

 

Session Hijacking

Authenticated user sessions are maintained by storing a session and authentication token on the client device (e.g. cookie in the browser). Attackers may bypass the login and take over an account by stealing a valid token. Stealing a token may be done using different techniques such as Man-In-The-Middle (MITM), Man-In-The-Browser (MITB), and others.

 

Rise of AI in ATO Fraud

The rapid developments in artificial intelligence are changing the fraud landscape as both attackers and those who fight to stop them are leveraging AI to be more effective. Fraudsters use generative AI to create more accurate and convincing social engineering campaigns at a large scale, developing phishing emails, scam texts, and scripts. Generative AI can also be used to create realistic voice and video fakes, and may be utilized to fake identities and identity documents in an attempt to bypass identity proofing. Meanwhile, counter-fraud tools also leverage AI, creating more accurate AI models using recent technological breakthroughs and leveraging LLMs as part of the fraud analytics process, offloading some of the human labor involved in fraud analysis. This makes finding the right fraud prevention team and tools so important in 2024 and beyond.

How Can You Improve ATO Detection?

  • Email and communications monitoring: Fraudsters make phishing attempts or other requests for information via email or text message, so it’s important to monitor communications to identify and block these attempts.
  • IP reputation: Fraud often originales from suspicious IP addresses. It is useful to look at IP reputation overall as well as other IP information such as country of origin to help spot attempted fraud.

  • Machine learning: Machine learning models can help you more effectively identify suspicious users and sessions with greater speed and accuracy.

  • Device information: A high number of “unknown” devices interacting with your site or app may be a sign of an ATO attack. Additionally, if a single device is accessing more than one account, this may also be a sign of an attacker targeting multiple accounts for ATO.

  • AI-based fraud detection: Today’s attackers are making use of AI to mimic legitimate users and make their attacks harder to detect, but in turn, AI-based detection technology can help identify these attacks.

Account Takeover Fraud Prevention

Protecting data from cybercriminals has to be a joint effort by individuals, enterprises and law enforcement. The cost of ATO fraud grows exponentially if left unchecked. For enterprises that fail to stop compromised accounts, the losses extend beyond the direct costs connected to each individual account. Customers often hold companies responsible for the success of fraudsters and high-profile ATOs make the news. The effects of ATO fraud continue for years, from lost customer revenue to damage to brand reputations.

 

Watch this short video to learn more about Ping's threat protection solution for detecting ATO, PingOne Protect.

 

Online fraud is an expensive global reality.
Bad actors try to penetrate digital identity systems to access valuable business resources and commit even bigger crimes.
PingOne Protect helps prevent fraud losses without hindering user experience or causing Legitimate users' frustration.
By evaluating user network behavior and device risk signals in real time across the entire User journey.
It starts by evaluating different risks.
Predictions.
As soon as the session begins, There are 10 out-of-the-box risk predictors, plus the ability to ingest any third-party data Feeds to create custom predictors.
Getting started with PingOne Protect is easy and fast, Delivering tangible value quickly.
The Setup Assistant wizard instantly configures default risk policies and scores based on a few Questions and responses.
Plus, Ping offers out-of-the-box flow templates for common fraud use cases and hundreds of Connectors that make integrating all of your risk and fraud services seamless and secure.
To understand where risk lies and help you make authentication decisions that increase security Posture, PingOne Protect has a robust dashboard and detailed reports that provide Insight into high-risk locations and factors Risk events, Risk predictors, browser, and operating system distribution, and the top riskiest users and IPs.
Click on each dashboard card to see details and Dive deep into risk data and inspect monitored user activity using advanced filtering options.
After the initial training period, you can leverage the dashboard to glean insights that Enable fine-tuning of risk thresholds and scores.
Those insights also help you derive tactics for minimizing false positives.
For example, adding a w0w list IPs to the geophilicity, IP reputation, and anonymous network predictors.
You can also add custom predictors, composite predictors, and overrides.
If anomalies are detected or a bad actor has potentially gained access to your systems, PingOne Protect helps you investigate and gather forensic evidence to prevent future Events.
Investigators have access to logs with robust Data inputs that can be reviewed manually, streamed via WebHook, or pushed via API.
Protect your business resources by preventing account takeover and new account fraud with PingOne Protect.

 

Data Protection

As an individual, there are a few things you can do to reduce the risk of ATO fraud. Stay current on threats and guard your credentials from phishing attacks, phone scams and other cyberattacks. Use unique, complex passwords every time and don't share them with anyone. Make sure your WiFi and IoT devices are secure, and avoid using public WiFi to access your business and personal accounts.

 

Security Protocols

Businesses need to be proactive in their efforts to reduce account takeovers, while making sure they don't frustrate or overburden legitimate users with endless verification steps. A holistic approach of combining identity and access management (IAM) solutions with fraud detection tools can stop bad actors before they are able to access user accounts.

 

Two-Factor Authentication (2FA)

Two-factor authentication (2FA) is a security mechanism that adds an extra layer of protection to user accounts by requiring two distinct forms of identification before granting access. The two pieces of verifiable information requested must be from different categories. Typically, this involves something the user knows (like a username or password) and something the user has (such as a mobile device that receives a verification code). By implementing 2FA, individuals can significantly reduce the risk of unauthorized account access, even if their primary credentials have been compromised.

 

Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) is a more comprehensive security approach that extends beyond two-factor authentication by requiring two or more verification factors to gain account access. These factors can include something the user knows (password), something they have (smartphone), and something they are (biometric data like fingerprint or facial recognition). MFA provides an even more robust defense against cybercriminals, making it more difficult for fraudsters to penetrate secure systems.

 

Diagram showing how Riskbased MFA works A user goes through the authentication process and risk rating and is either granted access challenged or denied access

 

Identity Proofing

Identity verification, also called identity proofing, is another security tool that is used to ensure a user's digital identity is tied to their real-life identity. Businesses can choose to deploy an identity verification step for high-risk or high-value transactions to further reduce the chance of fraud.

 

IAM Solutions

For enterprises, the threat of fraudsters taking over legitimate user accounts is amplified by the fact that insiders and verified users can also be bad actors. An identity and access management (IAM) system integrated with fraud detection tools can help enterprises automate real-time fraud mitigation during a session to prevent bad actors from carrying out their fraudulent activities.

 

Fraud Detection Tools

Modern online fraud detection tools use artificial intelligence (AI) to examine hundreds of unique user data points generated by human-to-device interactions, device attributes and account activities to distinguish between legitimate users and fraudsters. Behavioral and context-based analysis identify automated (bot) and fraudster behavior because they don't follow the same pattern as legitimate user activity. Fraud detection tools can be activated when a session begins, which allows them to recognize unnatural activity during the session and stop fraud before transactions are made.

 

To learn more about online fraud, please read our Ultimate Guide to Fraud Prevention.

 

Frequently Asked Questions

E-commerce and banking accounts are rich sources of personal and financial information that can be monetized quickly. Fraudsters target these accounts to access funds, make purchases, or gather information for other types of fraud.

Credential stuffing uses bots to test username and password combinations across multiple sites, taking advantage of users who reuse passwords. If a match is found, the fraudster gains access and can compromise the account.

Consumers expect brands to safeguard their data and secure their accounts, viewing it as part of the service. ATO incidents can severely damage brand reputation, as customers lose trust if companies fail to protect their information.

Industries like banking, e-commerce, and healthcare are especially vulnerable due to the high value of the sensitive information stored in accounts. Fraudsters exploit these sectors to access data or make unauthorized transactions.

MFA adds an extra layer of verification that fraudsters generally can't bypass, even if they have your password. This makes it significantly harder for unauthorized users to access accounts, reducing the risk of takeover.

Share this Article:
Related Resources

Start Today

See how Ping can help you deliver secure employee, partner, and customer experiences in a rapidly evolving digital world.