Home GDPR #Privacy: How hackers are using takeover tactics to exploit users
GDPR - December 13, 2019

#Privacy: How hackers are using takeover tactics to exploit users

Castle, a user-centric account security company, has announced the availability of Evolution of Attacks on Online Users eBook

The eBook provides research that illustrates four new tactics cyberattackers are using to successfully take over accounts and exploit users. Castle is continuously researching attacks to improve threat modeling for attack detection and prevention.

Stolen credentials have been linked to some of the largest and most costly data breaches to date, including Equifax and Yahoo, which affected almost half of the US Population. Despite the success of these attacks, attackers continue to search for ways to improve success by tricking security tools to avoid detection.

Traditional success rates of account takeover attacks have been approximately .1%, but over the past year, Castle has discovered new trends in attack patterns with success rates as high as 20-30% in finding valid credentials.

The company’s research team was analyzing malicious login attempts of 100 million+ worldwide user accounts when it discovered this massive increase for some of its customers. Through its investigations and data analysis, the company identified four new trends in account takeover.

Below are tactics that attackers are using to improve their success rates as they target user accounts.

  • Appear Larger – Use More Users, More IPs: The eBook details a real-life example where an attacker used 60,000 IPs in 210 countries to complete 700,000 login attempts in over 10 hours. Although the site saw upticks in failed logins over the course of the attack, three failed login attempts per hour, per IP didn’t raise much suspicion in isolation. Ultimately, the attacker got more than 700 validated credentials, which they could use to perpetrate an attack.
  • Appear Local – Use Local IPs: As attackers attempt to emulate as many users as possible to blend in, they also want users to appear to be coming from countries and locations that won’t raise any suspicion. The eBook illustrates an attack where the attacker used 1000 IPs, from multiple data centers across the U.S. to complete 650K login attempts over a 10-hour period without increasing any suspicion.
  • Appear Better – Use Fake Accounts to Improve Reputation: Attackers understand the importance of trust – if an attackers can gain trust, they have a better chance of success. In order to establish trust, attackers are registering fake, ‘canary,’ accounts to try to build up the reputation of the IPs they plan to use in their attack. The eBook provides an example of where an attacker used 6000 fake accounts to perform 30K each logins during the course of an attack, meaning that each account was logging in every three seconds to keep their reputation.
  • Appear Legitimate – Use Registration and Password Resets: To reduce the amount of attempts attackers need to validate their credentials, they are exploiting UX features on sites that are meant to make it easier for users, including password resets and registration forms. By using password resets and registration forms, attackers can quickly identify legitimate email addresses which greatly reduces the number that they need to keep and try when validating credentials.

“As attackers become more sophisticated, it’s our responsibility to conduct the research needed to stay ahead of them,” said Johan Brissmyr, co-founder and CEO of Castle.

“Detecting new attack trends early on is critical in maintaining both security and user experience which could impact a company’s bottom line. Fortunately we discovered these attacks early and kept our customers and their user’s accounts protected.”

The “Evolution of Attacks on Online Users” eBook also provides tips for companies to improve defenses including implementing IP rules and blacklisting as well as a list of helpful resources and tools. For more information, please see the full eBook here.

The post #Privacy: How hackers are using takeover tactics to exploit users appeared first on PrivSec Report.


Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Also

Russian Convicted of Aiding Kelihos Botnet Operator

Prosecutors: Crypting Provider Helped Infect 50,000 ComputersA Russian national has been c…