Inside the Two Types of Account Takeover Attacks

  /     /     /  
Publicated : 22/11/2024   Category : security


Inside the Two Types of Account Takeover Attacks


There are two types of automated threats that leverage user credentials to target login pages with account takeover.



If your website has a login page, chances are good that its targeted in account takeover attacks. Nearly all (96%) websites with login pages have bad bots and are hit with account takeover attempts, report researchers from the Distil Networks Research Lab.
Login pages are among the most abused Web pages, a finding from the 2017 Bad Bot report that prompted the research team to analyze the anatomy of account takeover attacks in greater depth. They studied data from 600 domains with login pages and pulled a smaller subset of 100 Web pages, which had the largest data sets of bad bot traffic, to study them further.
Account takeover attempts are intended to test credentials for validity. If theyre legitimate, attackers sell the usernames and passwords on the Dark Web or gain account access to pilfer personal or financial information and sell that instead. Alternatively, they could use the account to transfer money, purchase goods or services, or spread disinformation campaigns.
There are two types of account takeover attempts and they occur at about the same frequency, researchers report. Half are volumetric, meaning the bot floods the login page with credentials in an attempt to verify them as soon as possible. These credential-stuffing attacks are easy to identify because theyre accompanied by a spike in activity: the average credential stuffing attack will involve 35,000 to 50,000 requests and between 500% and 5,000% increase in login page traffic.
While theyre easier for businesses to detect, volumetric attempts have the benefit of immediate gratification to perpetrators. If you suddenly see a massive increase in failed logins, its indicative of a volumetric attack, says Edward Roberts, Distils director of product marketing. If they can do that quickly and check with various sites across the Web, theres a benefit.
Volumetric attempts increase 300% after data breaches, when large amounts of credentials are made readily available to attackers. Bot operators assume two things: recently stolen credentials will still be active, and that people reuse their credentials across several websites. Researchers detected 17 volumetric credential stuffing attacks per day. The average number of attacks per organization is two to three per month; however, some sites are hit with as many as 10.
The other half of account takeover attempts are low and slow, otherwise known as credential cracking and stuffing attacks. In these, bad bots consistently deliver login requests 24/7. Theyre slower-paced and because of that, its tougher for businesses to pick up on them.
Volumetric attacks usually occur within a set time frame. Low and slow attempts rely on an ongoing stream of malicious requests. They have no distinct beginning or end.
Sites with login pages are likely to get hit, says Roberts, who notes airlines, e-commerce sites, and financial companies are often targeted. Attempts range from simple ones, which generate significant traffic per device, to sophisticated attacks with as few as two requests per device.
In terms of the difference here, its about how they are trying to hide themselves and how theyre trying to be evasive, he explains. As they get more sophisticated, attackers make a greater effort to fly under organizations radar.
Businesses can mitigate simple account takeover attempts by blocking IP addresses, IP organizations, or traffic from specific countries. Moderate attempts can be mitigated by blocking the device fingerprint. Sophisticated attacks are best addressed by using deep interrogation to verify the legitimacy of each request, researchers 
report
.
Researchers noticed a few key trends in how attackers plan account takeover attempts. These attacks usually happen at a predetermined frequency; for example, sites hit with attacks on Wednesday will also experience their next attack on a Wednesday. Often, they conduct a test round to gauge the effectiveness of their bots ahead of a large attack. Attempts were also more likely to happen on Fridays and Saturdays, when most security teams are offline.
Related Content:
12 Trends Shaping Identity Management
Reno Man Created 8,000 Fake Online Accounts via Stolen Identities
More Than 1M Children Victims of Identity Fraud in 2017
Speed at Which New Drupal Flaw Was Exploited Highlights Patching Challenges

Last News

▸ Making use of a homemade Android army ◂
Discovered: 23/12/2024
Category: security

▸ CryptoWall is more widespread but less lucrative than CryptoLocker. ◂
Discovered: 23/12/2024
Category: security

▸ Feds probe cyber breaches at JPMorgan, other banks. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Inside the Two Types of Account Takeover Attacks