• Products

    Digital Trust & Safety Platform

    Fight fraud without sacrificing growth

    Learn more

    Platform solutions

    • Payment Protection
    • Account Defense
    • Dispute Management
    • Content Integrity
    • Sift Connect

    Sift innovations

    • PSD2 Solution
    • New Releases & Enhancements
  • Industries

    One solution, any industry

    Learn how Sift can work for your industry

    Learn more

    Featured Industries

    • Fintech
    • Payment Service Providers
    • Retail
  • Customers

    Case studies by industry

    See how leading brands succeed with Sift

    Learn more

    Featured Customers

    • DoorDash
    • Uphold
    • Paula’s Choice
  • Partners
  • Fraud Center
  • Resources

    Live webinars & events

    Industry conferences and live sessions

    Learn more

    • Blog
    • Demos
    • Infographics
    • Ebooks & Reports
    • Videos
    • Podcasts
    • One-Pagers
    • On-demand webinars
    • Trust & Safety University
  • Company

    Why leaders choose Sift

    Technology, community, and partnership

    Learn more

    Our mission: Help everyone trust the internet

    • About
    • Careers
    • News & Press
    • Live events
Talk to an expert
Products
  • Digital Trust & Safety Platform
  • Payment Protection
  • Account Defense
  • Dispute Management
  • Content Integrity
  • Sift Connect
  • PSD2 Solution
  • New Releases & Enhancements
Industries
  • Fintech
  • Retail
  • Payment Service Providers
Customers
Partners
Fraud Center
Resources
  • Live webinars & events
  • Blog
  • Ebooks & Reports
  • One-Pagers
  • Demos
  • Videos
  • On-demand webinars
  • Infographics
  • Podcasts
  • Trust and Safety University
Company
  • Search Careers
  • Our Company
  • Contact Us
  • Engineering Blog
Talk to an expert Sign in
  • Blog Home
  • Account Fraud
< prev / next >
Share this article on LinkedIn
Tweet this article
Share this article on Facebook
SOCIALICON
Share this article via email

How do account takeover (ATO) attacks bypass multi-factor authentication (MFA)?

By Sift Trust and Safety Team  / 

July 20, 2023

Fraudsters are experts at adapting to their environment. As businesses implement more sophisticated fraud prevention measures, cybercriminals are constantly looking to outsmart and outmaneuver them. To combat this, more companies are utilizing stronger user authentication methods, such as multi-factor authentication (MFA), to verify their legitimate customers and keep fraudsters at bay.

MFA adds an extra layer of security, such as the use of one-time passwords (OTP), to verify the identity of users. However, account takeover (ATO) attacks can bypass MFA with OTP bots, SIM swapping, and MFA prompt bombing. Even if MFA were 100% effective, it creates friction with users, which can stall sales and slow growth.

Account takeover attacks (ATO) are a type of cyberattack that results in the unauthorized access of an account, typically through the use of stolen credentials. Once an account has been compromised, it may be used to launch additional attacks, make fraudulent purchases or transactions, or steal valuable information. According to Sift’s Q2 2023 Digital Trust & Safety Index, ATO has increased a concerning 427% in Q1 2023—compared to the entirety of 2022. 

In this blog, we will explain three methods fraudsters who perpetrate ATO attacks use to bypass MFA and how businesses can protect themselves.

What is a one-time password (OTP) bot?

One-time password (OTP) bots are an automated fraud service used during ATO attacks to target victims with fake phone calls and SMS messages. These OTP bots use social engineering techniques to steal passwords from victims.

What is SIM-swapping?

Another tactic is subscriber identity module (SIM)-swapping, which is an advanced account takeover (ATO) attack technique that intercepts one-time passwords (OTPs) by temporarily gaining control of a victim’s phone number to receive calls and texts. SIM-swapping uses social engineering to convince the victim’s mobile phone company to transfer the line to a different SIM card. 

For example, fraudsters may pretend to be a user locked out of their account or a mobile phone employee trying to help someone in the store. Attackers have even been known to bribe employees to gain this access.

What is MFA prompt bombing?

MFA prompt bombing is an account takeover (ATO) attack technique that uses social engineering to trick a user into unwittingly granting access to a malicious authentication attempt. These attacks seek to frustrate their targets into accidentally accepting the push notifications of MFA apps by sending them when they are most distracted. 

For example, an attacker may repeatedly send an MFA push notification in the middle of the night, until their target finally accepts the prompt so they can fall back asleep.

Once an account is compromised, fraudsters can disable security settings (e.g., MFA), reset passwords, and change account information (e.g. email address). Fraudsters can then use these compromised accounts (or sell them on the dark web) to make unauthorized purchases and transfers or conduct additional attacks.

How to prevent account takeover attacks (ATO)

Preventing account takeover (ATO) attacks requires multiple layers of defense since multi-factor authentication (MFA) can be bypassed by hackers. Device intelligence, IP address analysis, behavioral analytics, high-risk activity monitoring and SIM swap detection can also prevent ATO.

The democratization of fraud, such as the sale of OTP bots on dark web forums, has lowered the barriers of entry for non-technical attackers. The automation of ATO has enabled it to grow at a much faster rate than manual fraud reviews can keep pace. Furthermore, many businesses are reluctant to require MFA because it is a source of customer friction that can slow sales and growth.

Sift’s Digital Trust & Safety Platform is an automated fraud management platform that prevents ATO. One trillion events from the Sift global data network power its AI-enabled approach. Device intelligence detects unfamiliar devices that are indicative of ATO. Behavioral analytics alert fraud prevention teams to high-risk account activity. Dynamic friction—the ability to enforce MFA based on a risk score—enables organizations to customize the solution according to their risk tolerance. 

With Sift, the end result is that businesses can prevent and detect ATO—with or without MFA.

Visit our Fraud Intelligence Center to discover more fraud schemes.

Related

ATOfraud preventionMFA

Sift Trust and Safety Team

  • < prev
  • Blog Home
  • next >
  • Company
  • Get a free demo
  • About us
  • Careers
  • News & press
  • Partner with us
  • Blog
  • Support
  • Help Center
  • Contact support
  • System status
  • Trust & Safety University
  • Fraud management
  • Developers
  • Overview
  • APIs
  • Client libraries
  • Integration guides
  • Tutorials
  • Engineering blog
  • Social

Don’t miss a thing

Get industry trends, insights, and actionable fraud-fighting tips.

You're on the list.

You can unsubscribe at any time. Please see our Website Privacy Notice.
Do Not Sell My Personal Information

If you are using a screen reader and are having problems using this website, please email support@sift.com for assistance.

© 2023 Sift Science, Inc. All rights reserved. Sift and the Sift logo are trademarks or registered trademarks of Sift Science, Inc.
Privacy & Terms

Secure your business from login to chargeback

Stop fraud, break down data silos, and lower friction with Sift.

  • Achieve up to 285% ROI
  • Increase user acceptance rates up to 99%
  • Drop time spent on manual review up to 80%
Your information will be used to contact you about our service and subscribe you to our direct marketing communications. You can, of course, unsubscribe at any time. Please see our Website Privacy Notice.