{"id":14958,"date":"2023-11-28T12:15:28","date_gmt":"2023-11-28T12:15:28","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=14958"},"modified":"2023-11-28T12:20:02","modified_gmt":"2023-11-28T12:20:02","slug":"account-takeover","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/","title":{"rendered":"ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>When a hacker obtains control of a valid account, it\u2019s known as account takeover fraud or account compromise. Unauthorized users gaining control of another person\u2019s online account without consent, such as a bank account, email account, or social media profile, is known as account takeover fraud (ATO). This article entails everything you need to know about account takeover protection. I also added some tips on how to prevent account takeover. Let\u2019s dive in now!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-account-takeover\"><span id=\"what-is-account-takeover\">What Is Account Takeover?<\/span><\/h2>\n\n\n\n<p>With the help of compromised login credentials, fraudsters can take control of user accounts in an assault known as Account Takeover (ATO). Many cybercriminals obtain a database of user credentials through social engineering, data breaches, or phishing attempts, and then sell those credentials on the dark web. They put these credentials to use by deploying bots to test passwords and usernames on a variety of different travel, retail, financial, e-commerce, and social media sites.<\/p>\n\n\n\n<p>When an attacker eventually compiles a list of validated credentials, they can benefit from selling or misusing the account. Identity theft is one of the consequences of account takeover attacks. Users often don\u2019t rotate their passwords and frequently use the same combination of characters across many services. Account takeover by automated password guessing (also known as \u201ccredential stuffing\u201d) or \u201cbrute force\u201d attacks is facilitated by bots. Mobile sites, websites, and native mobile application APIs all have verification login pages that can be breached by cybercriminals. Once they have access, fraudsters can commit fraud and account takeover, such as by exploiting the user\u2019s loyalty points.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-account-takeover-attacks-how-do-they-operate\"><span id=\"account-takeover-attacks-how-do-they-operate\">Account Takeover Attacks: How Do They Operate?<\/span><\/h2>\n\n\n\n<p>Although the fundamentals of an ATO attack are not particularly complicated, spotting one can be challenging. Let\u2019s examine the fundamental procedures for gaining access to an unwary user\u2019s internet account:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Obtaining a trove of user credentials is the starting point of any ATO attack. Phishing campaigns and network hacking are common entry points for attackers seeking user credentials. On the dark web, other attackers merely purchase a list of credentials.<\/li>\n\n\n\n<li>An attacker tests a list of login credentials against websites that they have access to. The typical attack strategy involves a large number of automated bots trying out a number of different forms of validation. Using automated bots to quickly go through a huge number of possible username and password pairs is a simple way for attackers to do brute force and credential stuffing attacks. An automated attack like this has an 8 percent chance of successfully breaking into the accounts it targets.<\/li>\n\n\n\n<li>By doing bad things with the validated credentials, like taking out money, starting credit lines, buying things, or selling them to other people to use, the attacker can make money once they have a list of them.<\/li>\n\n\n\n<li>Most users share their login credentials with multiple websites. An attacker who has found a working login and password is likely to try that same combination on other widely used retail, travel, social media, banking, and e-commerce sites in an effort to multiply their gains. This makes each verified credential more profitable for a cybercriminal.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-account-takeover-fraud-happens\"><span id=\"how-account-takeover-fraud-happens\">How Account Takeover Fraud Happens<\/span><\/h2>\n\n\n\n<p>Obtaining a user\u2019s login information is the first step toward successfully hijacking their account. Here is how account takeover fraud happens:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-brute-force-attacks\"><span id=\"1-brute-force-attacks\">#1. Brute-force attacks<\/span><\/h3>\n\n\n\n<p>Typically, an automated script is used by the attacker to try various combinations of usernames and passwords across multiple accounts. Attackers have been known to resort to \u201cdictionary attacks,\u201d in which they try to guess passwords by looking up words in a dictionary.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-breach-replay-attack-nbsp\"><span id=\"2-breach-replay-attack\">#2. Breach replay attack\u00a0<\/span><\/h3>\n\n\n\n<p>It\u2019s not a good idea to reuse passwords across several accounts, yet lots of people do it nonetheless. Every account that has the same username (often an email address) and password is vulnerable to the same data breach that exposed the compromised password.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-man-in-the-middle-mitm-attacks\"><span id=\"3-man-in-the-middle-mitm-attacks\">#3. Man-in-the-middle (MitM) attacks<\/span><\/h3>\n\n\n\n<p>Attackers can obtain sensitive data, including login passwords, by listening in on user-website communications. This information gives them the ability to take control of their accounts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-phishing\"><span id=\"4-phishing\">#4. Phishing<\/span><\/h3>\n\n\n\n<p>It is still possible to get someone\u2019s password through old-fashioned credential hacking. Account compromise can occur if adequate safeguards are not in place, such as multifactor authentication (MFA).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-malware-attacks\"><span id=\"5-malware-attacks\">#5. Malware attacks<\/span><\/h3>\n\n\n\n<p>Malware such as keyloggers, stealers, and others can reveal user credentials, allowing attackers to take over victims\u2019 accounts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-data-exfiltration\"><span id=\"6-data-exfiltration\">#6. Data exfiltration<\/span><\/h3>\n\n\n\n<p>An attacker can acquire access to a user\u2019s account by stealing their login information (such as their username and password) by unlawful data retrieval, transfer, or copying from a device or server.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-7-credential-stuffing\"><span id=\"7-credential-stuffing\">#7. Credential stuffing<\/span><\/h3>\n\n\n\n<p>To acquire unauthorized access, cybercriminals utilize automated systems to sift through data breaches on other websites in search of usernames and passwords.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-factors-increasing-the-frequency-of-account-takeover-fraud\"><span id=\"factors-increasing-the-frequency-of-account-takeover-fraud\">Factors Increasing the Frequency of Account Takeover Fraud<\/span><\/h3>\n\n\n\n<p>By allowing them to avoid direct user theft, darknet markets make account takeover fraud a much more tempting target for attackers. Rather than going through the laborious process of breaking passwords, attackers who wish to take direct advantage of their targets can just buy legitimate accounts on darknet markets.<\/p>\n\n\n\n<p>Increased online bank accounts and products not only contribute to the growth of darknet markets but also facilitate theft from their consumers. Targeted users frequently have numerous bank accounts dispersed over numerous websites. Since more and more people now have bank accounts and a digital footprint, the opportunity for ATO fraud has grown.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-detection-of-account-takeover-fraud\"><span id=\"detection-of-account-takeover-fraud\">Detection of Account Takeover Fraud<\/span><\/h2>\n\n\n\n<p>While it may seem impossible to spot ATO fraud, it is often possible to do so by keeping an eye out for unusual patterns of behavior. Some of the best methods for spotting possible account takeover fraud are as follows:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-keep-an-eye-on-emails-and-other-correspondence\"><span id=\"1-keep-an-eye-on-emails-and-other-correspondence\">#1. Keep an eye on emails and other correspondence<\/span><\/h3>\n\n\n\n<p>It\u2019s imperative to put policies in place that efficiently keep an eye out for questionable activity, such as phishing attempts or requests for private information, in emails, texts, and other forms of communication.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-identify-shady-ip-addresses\"><span id=\"2-identify-shady-ip-addresses\">#2. Identify shady IP addresses<\/span><\/h3>\n\n\n\n<p>Seek out anomalous activity with dubious IP addresses (such as those originating from nations beyond customary access points) and examine data transfers with timestamps. This makes it easier to spot dishonest people trying to hijack an account.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-utilize-models-for-machine-learning\"><span id=\"3-utilize-models-for-machine-learning\">#3. Utilize models for machine learning<\/span><\/h3>\n\n\n\n<p>Account compromise due to malevolent takeover, phishing, or stolen credentials can be identified with the use of machine learning models, which can then be used to help identify fraudulent online activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-make-use-of-ai-based-detecting-tools-nbsp\"><span id=\"4-make-use-of-ai-based-detecting-tools\">#4. Make use of AI-based detecting tools\u00a0<\/span><\/h3>\n\n\n\n<p>In order to evade isolation, ATO attacks frequently employ fourth-generation bots that imitate human behavior. AI-based detection tools have the potential to successfully recognize these ATO threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-identify-and-block-requests-from-known-attackers\"><span id=\"5-identify-and-block-requests-from-known-attackers\">#5. Identify and block requests from known attackers<\/span><\/h3>\n\n\n\n<p>Identify and prevent requests from known attackers; detect malicious bots used in ATO attacks. Password stuffing can also be detected via login attempts and prevented.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-identify-unidentified-devices\"><span id=\"6-identify-unidentified-devices\">#6. Identify unidentified devices<\/span><\/h3>\n\n\n\n<p>The identity of an attacker\u2019s device can be hidden through the use of \u201cdevice spoofing\u201d techniques. An ATO threat is probably present if your system labels devices as \u201cunknown,\u201d particularly if the ratio is very high.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-7-one-device-accessing-several-accounts\"><span id=\"7-one-device-accessing-several-accounts\">#7. One device accessing several accounts<\/span><\/h3>\n\n\n\n<p>An attacker\u2019s activities will probably be associated with a single device if they manage to obtain access to multiple accounts through theft. This can indicate an ATO assault.<\/p>\n\n\n\n<p>You may better identify and stop ATO fraud and safeguard your accounts from illegal access by putting these measures into practice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-prevent-account-takeover-fraud\"><span id=\"how-to-prevent-account-takeover-fraud\">How to Prevent Account Takeover Fraud<\/span><\/h2>\n\n\n\n<p>The necessity to take measures to prevent such expensive attacks has increased as ATO fraud has become an increasingly serious problem for both people and organizations. The following are ways you can prevent account takeover fraud:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-limit-the-frequency-of-login-attempts\"><span id=\"1-limit-the-frequency-of-login-attempts\">#1. Limit the frequency of login attempts<\/span><\/h3>\n\n\n\n<p>Limits on the number of consecutive failed login attempts per user, device, and IP address should be implemented. The typical conduct of users can serve as a benchmark for determining these restrictions, which will help avoid account takeover. Restrictions on the usage of VPNs, proxies, and other tools are also options.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-use-password-security-guidelines\"><span id=\"2-use-password-security-guidelines\">#2. Use password security guidelines<\/span><\/h3>\n\n\n\n<p>Make certain that workers create strong, one-of-a-kind passwords for all of their accounts. Use safe services like LastPass, 1Password, or Bitwarden to keep track of a bunch of passwords and make managing them easier.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-early-detection\"><span id=\"3-early-detection\">#3. Early detection<\/span><\/h3>\n\n\n\n<p>Early detection can lead to the prevention of ATO. If you want to put a stop to ATO, you need to know how long an attack takes and how to deal with the various attack patterns that pop up in the first 18 to 24 months after a breach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-implement-multifactor-authentication\"><span id=\"4-implement-multifactor-authentication\">#4. Implement multifactor authentication<\/span><\/h3>\n\n\n\n<p>Multifactor authentication is an extra layer of account protection that necessitates more than just a password, such as a code texted to a mobile device.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-put-compromised-accounts-on-hold-nbsp\"><span id=\"5-put-compromised-accounts-on-hold\">#5. Put compromised accounts on hold\u00a0<\/span><\/h3>\n\n\n\n<p>The first action to take in the event of an account compromise is to freeze it. Attackers are hindered in their attempts to get access and undertake operations such as changing passwords.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-make-use-of-captcha\"><span id=\"6-make-use-of-captcha\">#6. Make use of CAPTCHA<\/span><\/h3>\n\n\n\n<p>\u00a0Fraud detection systems have the option to show a CAPTCHA in place of shutting down an IP after a predetermined number of unsuccessful authentication attempts. After receiving too many requests for authentication from the same IP address, the CAPTCHA may be necessary for a predetermined amount of time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-7-keep-an-eye-on-accounts-for-any-unusual-behavior\"><span id=\"7-keep-an-eye-on-accounts-for-any-unusual-behavior\">#7. Keep an eye on accounts for any unusual behavior<\/span><\/h3>\n\n\n\n<p>It\u2019s critical to keep an eye out for any strange activity on accounts, including erratic transactions, altered account information, and unsuccessful login attempts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-impact-of-account-takeover-attacks\"><span id=\"impact-of-account-takeover-attacks\">Impact of Account Takeover Attacks<\/span><\/h2>\n\n\n\n<p>The effects of an ATO on people and businesses can be devastating if the attack is successful. The following are some consequences of account takeover fraud at both levels:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-identity-theft\"><span id=\"1-identity-theft\">#1. Identity theft<\/span><\/h3>\n\n\n\n<p>Identity theft occurs when criminals obtain sensitive information such as a victim\u2019s social security number, credit card number, or login credentials. Lower credit scores and significant financial losses may be the result.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-monetary-losses\"><span id=\"2-monetary-losses\">#2. Monetary losses<\/span><\/h3>\n\n\n\n<p>ATO scammers can access other accounts connected to the victim\u2019s account, make unlawful transactions, or transfer money using stolen login credentials. Both people and companies may suffer large financial losses as a result of this. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-behavioral-harm\"><span id=\"3-behavioral-harm\">#3. Behavioral harm<\/span><\/h3>\n\n\n\n<p>ATO fraud can harm a company\u2019s reputation and cost them money in lost sales and consumer loyalty.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-recharges\"><span id=\"4-recharges\">#4. Recharges\u00a0<\/span><\/h3>\n\n\n\n<p>ATO attacks may result in chargebacks for fraudulent transactions, which could cost organizations money to dispute and process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-adverse-effect-on-the-user-s-experience\"><span id=\"5-adverse-effect-on-the-users-experience\">#5. Adverse effect on the user\u2019s experience<\/span><\/h3>\n\n\n\n<p>ATO attacks have the potential to seriously harm a brand\u2019s reputation as well as its user experience. eCommerce organizations, for example, have a duty to protect user accounts; otherwise, they risk fraudulent transactions, payment fraud, customer mistrust, and a bad reputation for their brand. According to Intellicheck.com, eCommerce accounts are the most frequently attacked, accounting for 61% of ATO attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recognizing-and-stopping-financial-institution-account-takeover-fraud\"><span id=\"recognizing-and-stopping-financial-institution-account-takeover-fraud\">Recognizing and Stopping Financial Institution Account Takeover Fraud<\/span><\/h2>\n\n\n\n<p>Because it can immediately result in theft and account breaches, ATO is particularly serious in financial institutions. Organizations can identify early warning signs of fraudulent activity indicative of an account takeover by conducting ongoing monitoring.<\/p>\n\n\n\n<p>Financial institutions will have full visibility into a user\u2019s activities throughout the transaction process thanks to an effective fraud detection system. A system that monitors every bank account activity is the best line of defense because it forces cybercriminals to perform additional tasks, such as creating a payee, before they can steal money.<\/p>\n\n\n\n<p>You can identify patterns of activity that indicate the possibility of account takeover fraud by keeping an eye on every action taken on an account. A fraud detection technique that continuously analyzes behavior can spot hints and trends to determine whether a consumer is under assault, as cybercriminals must accomplish a number of tasks before they can move money from an account. This kind of fraud detection procedure can also keep an eye on danger by using data, such as location.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-read-also-top-most-common-cyber-security-threats-to-take-note-of-in-2024\"><span id=\"read-also-top-most-common-cyber-security-threats-to-take-note-of-in-2024\">Read Also: <a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/cyber-security-threats\/\">Top Most Common Cyber Security Threats to Take Note Of in 2024<\/a><\/span><\/h5>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-account-takeover-protection\"><span id=\"account-takeover-protection\">Account Takeover Protection<\/span><\/h2>\n\n\n\n<p>Here is how account takeover protection works:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-anti-account-takeover-measures\"><span id=\"1-anti-account-takeover-measures\">#1. Anti-Account takeover measures<\/span><\/h3>\n\n\n\n<p>As a fraud prevention strategy, account takeover protection intercepts attacks before they can do any damage. Newer methods of protecting against account takeover use machine learning to find and stop key signs of scams.<\/p>\n\n\n\n<p>Key signs of account compromise are regularly studied by machine learning algorithms, which use the data to safeguard consumer accounts. If a user\u2019s attempt at login is thought to be suspect, they are directed through a challenge flow that calls for more authentication.<\/p>\n\n\n\n<p>You can change this extra step of identification, but it usually comes in the form of a one-time password sent by text message, email, or the authenticator app. After completing the task successfully, you can log in. Products like Spectrum aim to prevent account takeover without causing any problems for real users.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-account-tracking-system\"><span id=\"2-account-tracking-system\">#2. Account tracking system<\/span><\/h3>\n\n\n\n<p>It\u2019s imperative to have a procedure in place to thwart subsequent assaults on compromised accounts. You can examine every activity associated with an account that is thought to be suspect by sandboxing it. If necessary, you can then suspend the account.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-web-application-firewalls\"><span id=\"3-web-application-firewalls\">#3. Web application firewalls<\/span><\/h3>\n\n\n\n<p>\u00a0Although they aid in the security of web servers, web application firewalls (WAFs) are less successful at identifying ATO attacks or setting off alarms. Although the most recent, sophisticated bot attacks mostly avoid and disregard WAFs, their widespread use has given website owners a false sense of security. Modern ATO assaults generally go unnoticed because neither WAFs nor standard website logging are sensitive enough to recognize patterns in the traffic.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-threat-information-and-surveillance\"><span id=\"4-threat-information-and-surveillance\">#4. Threat information and surveillance<\/span><\/h3>\n\n\n\n<p>These systems track and examine information from multiple sources, such as publicly available blacklists, security lapses, and questionable online activity, in order to identify possible dangers and compromised accounts. They can assist in stopping unauthorized access attempts and offer notifications in real time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-tracking-account-activity-and-creating-user-profiles\"><span id=\"4-tracking-account-activity-and-creating-user-profiles\">#4. Tracking account activity and creating user profiles<\/span><\/h3>\n\n\n\n<p>Solutions that keep an eye on user account activity, including transactions, login history, and account settings modifications, are able to spot odd or suspicious activity. Analyzing past data and user behavior to find trends and identify abnormalities in the process of user profiling.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-training-on-security-awareness-and-user-education\"><span id=\"5-training-on-security-awareness-and-user-education\">#5. Training on security awareness and user education<\/span><\/h3>\n\n\n\n<p>Helping to prevent account takeover fraud is cybersecurity training that teaches users about phishing tactics, typical attack methods, and best security practices. This includes advising users to practice good password hygiene, warning them not to share private information, and explaining how to spot and report suspicious behavior.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-6-ip-tracking-and-anomaly-identification\"><span id=\"6-ip-tracking-and-anomaly-identification\">#6. IP tracking and anomaly identification<\/span><\/h3>\n\n\n\n<p>With regard to login attempts, these tools examine the location and behavioral patterns. They are able to spot suspicious activity, such as attempts to log in from strange places or strange login patterns, and set off more security precautions or alarms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-7-fingerprinting-of-devices\"><span id=\"7-fingerprinting-of-devices\">#7. Fingerprinting of devices<\/span><\/h3>\n\n\n\n<p>With the use of this technology, each device can have its own unique identifier, or \u201cfingerprint,\u201d created by gathering and evaluating device-specific data such as IP address, operating system, browser type, and cookies. Fingerprinting identifies possible account takeover attempts and assists in detecting anomalies such as login attempts from unidentified devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-8-biometrics-based-on-behavior\"><span id=\"8-biometrics-based-on-behavior\">#8. Biometrics based on behavior<\/span><\/h3>\n\n\n\n<p>To determine an individual\u2019s usual behavior, behavioral biometrics solutions examine data such as keystrokes, mouse movements, typing speed, and navigation habits. Any departures from the norm may set off alarms and suggest potential fraud.<\/p>\n\n\n\n<p>It is imperative to acknowledge that the aforementioned tools and solutions have to be employed in conjunction with a comprehensive cybersecurity and data protection strategy, customized to the particular requirements of the entity or individual, and updated on a regular basis to tackle new threats and vulnerabilities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-9-homegrown-bot-management\"><span id=\"9-homegrown-bot-management\">#9. Homegrown bot management<\/span><\/h3>\n\n\n\n<p>To stop bots, homegrown solutions like volumetric-based and geo-based identification use signature rules, and policies that have already been set up. However, over time, signature-based detection\u2019s effectiveness has drastically decreased. Blocking traffic due to an unforeseen spike may result in blocking legitimate users as well. Hyper-distributed bot attacks are another challenging issue for signature-based systems to handle.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-10-ai-powered-detection\"><span id=\"10-ai-powered-detection\">#10. AI-Powered detection<\/span><\/h3>\n\n\n\n<p>ATO prevention and detection systems that use AI are able to identify increasingly complex bot assaults and account takeover attempts. ATO efforts frequently employ fourth-generation bots, which are more difficult to detect since they may mimic human behavior. To successfully detect sophisticated ATO efforts and keep an eye out for suspicious activity at a site, advanced AI-based technology is required.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-which-methods-are-applied-when-taking-over-an-account\"><span id=\"which-methods-are-applied-when-taking-over-an-account\">Which Methods Are Applied When Taking Over an Account?<\/span><\/h2>\n\n\n\n<p>Cybercriminals can utilize an array of strategies to obtain entry into an obliging user\u2019s account. An attacker may use a technique known as password spraying, in which they try a popular default password, like \u201cPassword1,\u201d against a large number of accounts if they have a list of usernames for a targeted site but not the passwords. The attacker methodically tries the assumed password against as many usernames as they can until they locate one that works by using the brute force of bot automation.<\/p>\n\n\n\n<p>The attacker might attempt to expand the attack to gain control of the user\u2019s accounts on more websites if they have a working login and password combination for the targeted site. We refer to this tactic as \u201ccredential stuffing.\u201d Once more, the attacker will utilize automated brute force attacks to rapidly attempt login credentials on major websites such as e-commerce, banking, and travel, with the aim that some customers have saved their usernames and passwords for several accounts.<\/p>\n\n\n\n<p>Account takeover is simple and highly profitable for fraudsters. Bots are always changing to avoid detection systems, which allows account takeover attacks to succeed and keeps website owners in the dark. By infecting real user devices with malware, bots can imitate human activity and remain hidden within a verified user session.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-who-does-account-takeover-attacks-aim-to-target\"><span id=\"who-does-account-takeover-attacks-aim-to-target\">Who Does Account Takeover Attacks Aim to Target?<\/span><\/h2>\n\n\n\n<p>Financial services firms were the initial targets of ATO, as is often the case with cyberattacks, as hackers tried to gain access to the money in users\u2019 accounts or establish credit lines in their names.<\/p>\n\n\n\n<p>These days, any company that keeps track of user accounts that could be misused for financial gain is open to attack. This can involve gaining control of travel or e-commerce accounts in order to make unauthorized purchases or use loyalty points. Additionally, it may involve focusing on network logins or email accounts used by businesses in an effort to obtain access to more sensitive data or launch a ransomware attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-the-purpose-of-account-takeover-protection\"><span id=\"what-is-the-purpose-of-account-takeover-protection\">What Is the Purpose of Account Takeover Protection?<\/span><\/h2>\n\n\n\n<p>Account Takeover Protection keeps an eye out for suspicious activity related to account access, purchases, and point redemptions, allowing you to safeguard your reward schemes and foster client loyalty.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-does-facility-takeover-fraud-mean\"><span id=\"what-does-facility-takeover-fraud-mean\">What Does Facility Takeover Fraud Mean?<\/span><\/h2>\n\n\n\n<p>When a fraudster pretends to be a legitimate customer in order to acquire access to an account or facility, a takeover has occurred. Fraudsters might gain control of any account, including credit card, bank, email, and other service provider accounts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-safeguards-are-there-against-account-takeover\"><span id=\"what-safeguards-are-there-against-account-takeover\">What Safeguards Are There Against Account Takeover?<\/span><\/h2>\n\n\n\n<p>Using two-factor authentication is one method of preventing account takeover. The best accounts for this security procedure are those with a high number of unsuccessful login attempts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-an-account-takeover-take-place\"><span id=\"how-does-an-account-takeover-take-place\">How Does an Account Takeover Take Place?<\/span><\/h2>\n\n\n\n<p>An assault known as \u201cAccount Takeover\u201d (ATO) occurs when hackers use usernames and passwords they have obtained to gain control of internet accounts. Usually obtained through social engineering, data breaches, and phishing attempts, cybercriminals buy lists of credentials on the dark web.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-final-thoughts\"><span id=\"final-thoughts\">Final Thoughts<\/span><\/h2>\n\n\n\n<p>Account takeover defense is the most accurate way to thwart ATO attacks. The system safeguards digital companies and their users from this expanding danger by combining proactive, real-time, and reactive detection methods.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-related-articles\"><span id=\"related-articles\">Related Articles<\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/privileged-access-management\/\">PRIVILEGED ACCESS MANAGEMENT: Definition & Best Practices<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/smishing-and-phishing-what-is-the-difference\/\">Smishing and Phishing: What Is The Difference?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/cyber-security\/what-to-do-if-your-identity-is-stolen-easy-recovery-guide\/\">What to Do If Your Identity Is Stolen: Easy Recovery Guide<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span id=\"references\">References<\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.humansecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">humansecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.proofpoint.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">proofpoint<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.imperva.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">imperva<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.outseer.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">outseer<\/a><\/li>\n<\/ul>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"When a hacker obtains control of a valid account, it\u2019s known as account takeover fraud or account compromise.&hellip;\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":250,"featured_media":16098,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[302],"tags":[],"class_list":{"0":"post-14958","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?<\/title>\n<meta name=\"description\" content=\"The necessity to take measures to prevent such expensive attacks has increased as ATO fraud has become an increasingly serious problem for both people and organizations. The following are ways you can prevent account takeover fraud: #1. Limit the frequency of login attempts\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?\" \/>\n<meta property=\"og:description\" content=\"The necessity to take measures to prevent such expensive attacks has increased as ATO fraud has become an increasingly serious problem for both people and organizations. The following are ways you can prevent account takeover fraud: #1. Limit the frequency of login attempts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/\" \/>\n<meta property=\"og:site_name\" content=\"Business Yield Technology\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-28T12:15:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-28T12:20:02+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Account-Takeover.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Folake Adegbaju\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Folake Adegbaju\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/\"},\"author\":{\"name\":\"Folake Adegbaju\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/d382d71b62343c442943617cd8afe3b1\"},\"headline\":\"ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?\",\"datePublished\":\"2023-11-28T12:15:28+00:00\",\"dateModified\":\"2023-11-28T12:20:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/\"},\"wordCount\":3253,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Account-Takeover.jpg?fit=500%2C250&ssl=1\",\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/\",\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/\",\"name\":\"ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Account-Takeover.jpg?fit=500%2C250&ssl=1\",\"datePublished\":\"2023-11-28T12:15:28+00:00\",\"dateModified\":\"2023-11-28T12:20:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/d382d71b62343c442943617cd8afe3b1\"},\"description\":\"The necessity to take measures to prevent such expensive attacks has increased as ATO fraud has become an increasingly serious problem for both people and organizations. The following are ways you can prevent account takeover fraud: #1. Limit the frequency of login attempts\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Account-Takeover.jpg?fit=500%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/businessyield.com\\\/tech\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/11\\\/Account-Takeover.jpg?fit=500%2C250&ssl=1\",\"width\":500,\"height\":250,\"caption\":\"Image by rawpixel.com on Freepik\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/cyber-security\\\/account-takeover\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/\",\"name\":\"Business Yield Technology\",\"description\":\"Best Tech Reviews, Apps, Phones, &amp; Gaming\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/#\\\/schema\\\/person\\\/d382d71b62343c442943617cd8afe3b1\",\"name\":\"Folake Adegbaju\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g\",\"caption\":\"Folake Adegbaju\"},\"url\":\"https:\\\/\\\/businessyield.com\\\/tech\\\/author\\\/adegbaju\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?","description":"The necessity to take measures to prevent such expensive attacks has increased as ATO fraud has become an increasingly serious problem for both people and organizations. The following are ways you can prevent account takeover fraud: #1. Limit the frequency of login attempts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/","og_locale":"en_US","og_type":"article","og_title":"ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?","og_description":"The necessity to take measures to prevent such expensive attacks has increased as ATO fraud has become an increasingly serious problem for both people and organizations. The following are ways you can prevent account takeover fraud: #1. Limit the frequency of login attempts","og_url":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/","og_site_name":"Business Yield Technology","article_published_time":"2023-11-28T12:15:28+00:00","article_modified_time":"2023-11-28T12:20:02+00:00","og_image":[{"width":500,"height":250,"url":"http:\/\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Account-Takeover.jpg","type":"image\/jpeg"}],"author":"Folake Adegbaju","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Folake Adegbaju","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/#article","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/"},"author":{"name":"Folake Adegbaju","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/d382d71b62343c442943617cd8afe3b1"},"headline":"ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?","datePublished":"2023-11-28T12:15:28+00:00","dateModified":"2023-11-28T12:20:02+00:00","mainEntityOfPage":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/"},"wordCount":3253,"commentCount":0,"image":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Account-Takeover.jpg?fit=500%2C250&ssl=1","articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/","url":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/","name":"ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/#primaryimage"},"image":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Account-Takeover.jpg?fit=500%2C250&ssl=1","datePublished":"2023-11-28T12:15:28+00:00","dateModified":"2023-11-28T12:20:02+00:00","author":{"@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/d382d71b62343c442943617cd8afe3b1"},"description":"The necessity to take measures to prevent such expensive attacks has increased as ATO fraud has become an increasingly serious problem for both people and organizations. The following are ways you can prevent account takeover fraud: #1. Limit the frequency of login attempts","breadcrumb":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/#primaryimage","url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Account-Takeover.jpg?fit=500%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Account-Takeover.jpg?fit=500%2C250&ssl=1","width":500,"height":250,"caption":"Image by rawpixel.com on Freepik"},{"@type":"BreadcrumbList","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/account-takeover\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/businessyield.com\/tech\/"},{"@type":"ListItem","position":2,"name":"ACCOUNT TAKEOVER: What Is It, How to Spot &amp; Stop It?"}]},{"@type":"WebSite","@id":"https:\/\/businessyield.com\/tech\/#website","url":"https:\/\/businessyield.com\/tech\/","name":"Business Yield Technology","description":"Best Tech Reviews, Apps, Phones, &amp; Gaming","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/businessyield.com\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/d382d71b62343c442943617cd8afe3b1","name":"Folake Adegbaju","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1995577059e01d5386796b1c2ccf4ced9c52e6a5416bbf5a6dc7e42264bb2d38?s=96&d=mm&r=g","caption":"Folake Adegbaju"},"url":"https:\/\/businessyield.com\/tech\/author\/adegbaju\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Account-Takeover.jpg?fit=500%2C250&ssl=1","jetpack_sharing_enabled":true,"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/comments?post=14958"}],"version-history":[{"count":5,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14958\/revisions"}],"predecessor-version":[{"id":16097,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14958\/revisions\/16097"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media\/16098"}],"wp:attachment":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media?parent=14958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/categories?post=14958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/tags?post=14958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}