Sift Logo Several blue dots forming a sphere to the left of the word Sift in italic font.
  • Products

    Digital Trust & Safety Suite

    Fight fraud without sacrificing growth

    Learn more →

    Passwordless
    Authentication

    Account
    Defense

    Content
    Integrity

    Payment
    Protection

    Dispute
    Management

    Sift
    Connect

    PSD2
    Solution

    New Releases & Enhancements

  • Partners

    Sift Partner
    Program

    Join the leader in Digital Trust & Safety

    Learn more →

    Commerce platform partners


  • Industries

    One solution, many applications

    Learn how Sift can work for your industry

    Learn more →

    Featured industries


    Fintech

    Retail

    Food & Beverage

  • Customers

    See case studies by industry

    Sift works across every use case and region

    Learn more →

    Featured customers


  • Resources

    Explore our resources

    Access trends, guides, and insights from Sift

    Learn more →

    Blog

    Ebooks

    One Pagers

    Demos

    Videos

    Webinars

    Infographics

    Podcasts

    Trust & Safety University

  • Fraud Center
  • Company

    Why leaders choose Sift

    Technology, community, and partnership

    Learn more →

    Our mission: Help everyone trust the internet


    About

    Careers

    News & Press

Request a demo
Products
  • Digital Trust & Safety Suite
  • Passwordless Authentication
  • Account Defense
  • Content Integrity
  • Payment Protection
  • Dispute Management
  • Sift Connect
  • PSD2 Solution
  • New Releases & Enchancements
Why Sift
  • Salesforce
  • Magento
  • Shopify
Industries
  • Fintech
  • Retail
  • Food & Beverage
Customers
Resources
  • Blog
  • Ebooks
  • One Pagers
  • Demos
  • Videos
  • Webinars
  • Infographics
  • Podcasts
  • Trust and Safety University
Fraud Center
About
  • Search Careers
  • Our Company
  • Contact Us
  • Engineering Blog
Request a DemoSign In
  • Blog Home
  • Account Fraud
  • Digital Trust & Safety
< prev / next >
Share this article on LinkedIn
Tweet this article
Share this article on Facebook
SOCIALICON
Share this article via email

3 Common ATO Attacks—and How to Stop Them

By Sift Product Team  / 

12 Apr 2022

Legacy account security—e.g., passwords and usernames—is nearing the end of its usefulness as a means to protect against account takeover (ATO) fraud. In fact, ATO is growing exponentially. Accelerated by the global pandemic, more consumers are relying on online services rather than brick-and-mortar stores—leading to a reliance on digital accounts and the need to protect those accounts from cybercriminals who want to steal stored value, payment information, demographics, and personally identifiable information (PII).

Successful online businesses need a multi-pronged, layered approach that addresses every step of the user journey, authenticates users, secures accounts, and stops ATO while also future-proofing against the more aggressive fraud attacks emerging every day.

Each layer can be viewed as a tool among many to protect various points of the user journey. In this article, we’ll go over some of the common attack methods Sift customers face and how to combat them.

Stolen login credential attacks

We’ve all experienced it: you get an email or text notification about suspicious login activity on one of your accounts—and it definitely wasn’t you trying to access the site or app. It’s a quick way to ruin a day, and it happens all too often. Somewhere along the line, a fraudster gained access to your account credentials (whether that’s through the dark web, phishing, or some other means). Fortunately, it’s much less common for nefarious actors to gain control over your device. 

With this in mind, a common way to protect users and detect account takeover attempts is to analyze the device being used to log in. With Sift, you can use Device Fingerprinting to uniquely identify the device a visitor is using to interact with your site, determine whether you’ve flagged that device as being associated with fraudulent behavior in the past, and prevent that visitor from using your site in the future.

To learn how to implement Sift Device Fingerprinting, read our integration guide.

In addition to analyzing the device, it’s also important to analyze the connecting IP address to determine if this is an IP the customer has used in the past. This can be determined using the Sift Console. A login using an unfamiliar device but a familiar and commonly used IP address may be a signal that the legitimate user has a different or new device. If both the device and IP address are unfamiliar, this indicates a higher-risk login event.

Credential stuffing attacks

Credential stuffing attacks are a form of stolen login credential attacks, and are automated using scripts and/or bots. In this type of attack, fraudsters use these automated tools to test large lists of stolen login credentials for popular websites. Because the attack is automated, the speed at which the stolen credentials are tested is an indicator that an ATO attempt is in progress.

Sift’s industry-leading, custom ATO machine learning model detects real-time risk at the point of login using over 100 signals, and can alert trust and safety teams of suspicious failed login attempts and potential bot-based attacks.

Social engineering and phishing

Ninety-eight percent of cybercrime involves social engineering, with attacks becoming increasingly complex. In many social engineering attacks, the victim is convinced to reveal important PII to a fraudster or complete an action that gives a fraudster access to an account.

Protecting accounts against these types of complex attacks requires access to, and analysis of, real-time data at multiple touchpoints. Dynamic Friction can play a critical role here, guiding users along whatever experience is appropriate for them on your site, and preventing cybercriminals from successfully mimicking trustworthy customers. But a better way to protect against social engineering would be to move away from a reliance on usernames and passwords.

Passwordless authentication relies on biometrics to authenticate users and allow access to accounts. Sift recently acquired Keyless, a pioneer in the passwordless space. Keyless provides a strong MFA (multi-factor authentication) solution that verifies people, not passwords, using strong liveness detection and biometric authentication technology to head off the risk of phishing, social engineering, and account takeover.

With the addition of Keyless to the Sift Digital Trust & Safety platform, you can apply adaptive friction to only the riskiest behavior, ensure your users are legitimate, and secure accounts against ATO.

Want to learn more about account security and how Sift can help? Download our new guide, Welcome to the New Era of Account Security.

Related

account defenseaccount securityaccount takeoverATOcredential stuffingdevice fingerprintingDigital Trust & Safetydynamic frictionfraud preventionkeyless

Sift Product Team

  • < prev
  • Blog Home
  • next >
Company
  • About Us
  • Careers
  • Contact Us
  • News & Press
  • Partner with us
  • Blog
Support
  • Help Center
  • Contact Support
  • System Status
  • Trust & Safety University
  • Fraud Management
Developers
  • Overview
  • APIs
  • Client Libraries
  • Integration Guides
  • Tutorials
  • Engineering Blog
Social

Don't miss a thing

Our newsletter delivers industry trends, insights, and more.

You're on the list.

You can unsubscribe at any time. Please see our Website Privacy Notice.

If you are using a screen reader and are having problems using this website, please email support@sift.com for assistance.

© 2022 Sift All Rights Reserved Privacy & Terms

Your information will be used to contact you about our service and subscribe you to our direct marketing communications. You can, of course, unsubscribe at any time. Please see our Website Privacy Notice.