The Times Australia
News From Asia

.
The Times Real Estate

.

Account takeover is on the rise: how to protect yourself

KUALA LUMPUR, MALAYSIA - Media OutReach - 28 October 2022 - Everyone has a friend who has been subject to account takeover attack. With 24 billion exposed accounts available online, this type of identity theft is now rampant in the digital domain.

This article from OctaFX security experts explores the nature of account takeover attacks and advises on how to protect yourself from them.



A recent research by Digital Shadows showed that more than 24 billion exposed credential pairings are available for sale online. That is a 65 per cent increase from 2020, probably due to more sophisticated malware and social engineering, as well as improved credential sharing.

With passwords such as ‘123456’ still accounting for more than one hundred million exposed cases, account takeovers are bound to continue. However, there are ways to avoid them, which we will cover later in the article. First, let’s consider whether account takeover (ATO) is something that everyone really has to worry about.

Account takeover: how it happens

The ATO attacks are somewhat similar to burglary. Fraudsters or hackers either crack your password using special software—just as burglars do to open the doors of a building—or get it from you through social engineering and dedicated malware. Then they make it impossible for you to log into your account by changing the password. Unlike the case with burglars, you can lose all your sensitive information, as well as your money, at once. After online fraudsters take all they want from your accounts, they might sell it on the dark web as part of a database consisting of such accounts.

There are several most common types of account takeover attacks carried out to steal your credentials:

  • Social engineering. These types of attacks typically use phishing emails from a service or organisation you are expected to trust, such as your bank, a broker, or a payment system. This email attempts to steal your personal information, including logins and passwords. Social engineers might also call you (that’s called vishing) and pretend to be bank representatives or customer service workers of some of the services you use. Then they attempt to trick you into giving them your login credentials or other sensitive information.
  • Malware. It’s easy to download malware accidentally. It may look just like another message from a client with an attached file, or as a file of a book you wanted to read so much. However, if you open it, there’s almost no way back—the program can encrypt all the files on your computer and block your system. The only way to decrypt the files and unblock the system is typically a hefty ransom.
  • Automated attacks. This type of ATO attack involves brute-forcing passwords, credential stuffing, where credentials obtained from an attack on one service are used for logging into other services, and password spraying, where a few common passwords are used for logging into different accounts.
  • Cyber attacks. Hackers might exploit vulnerabilities in applications and sites to obtain their user databases with logins and passwords. Then they either sell the databases on the dark web or try to use them themselves.

Five tips from OctaFX on how to protect your accounts from takeover

The OctaFX security experts have come up with several important rules that every internet user must follow to protect their accounts from cyber attacks:

  • Always use strong passwords. Many strong passwords. Ideally, let each of your accounts have its own password. For critical accounts, create passwords longer than ten characters, with combinations of upper-case and lower-case letters, numbers, and special characters. Use password managers, such as KeePass, to store your passwords.
  • Use MFA (multi-factor authentication), such as 2FA (two-factor authentication), to confirm your identity via email notification, smartphone, PIN, fingerprints, or facial recognition. An alternative to MFA is an authenticator app, which generates random six-digit codes every thirty seconds that you must enter when trying to log into your account.
  • Don’t use your work email address for personal use. Preferably, use multiple personal email addresses.
  • Don’t save your bank cards with any online store. When buying something on the internet, make sure the site you are using is reliable and secure.
  • Don’t use public Wi-Fi or any other public network when logging in to important accounts.
  • Don’t follow suspicious links and don’t download attachments from suspicious emails that you have not seen before.

Preventive measures against potential ATO attack

Don’t panic. If you received a message indicating that someone is trying to log into your account, check its login history and the devices that have access to it, if such information is available. If anything seems suspicious to you, or you know for certain that it wasn’t you who entered the account, change your password immediately. Look carefully if any information of yours has been altered or removed, and try to recover it.

Four steps to take after an ATO attack

  • Try to regain access to your accounts. If you are lucky and the fraudsters haven’t changed your password or removed your recovery phone number, you can access your account and change the password yourself. Remember to do it quickly!
  • If you cannot log into your account any more, try contacting the support team of the service or site with which you have the account. Ask them to block your account. Be ready to provide evidence proving that you owned the account in the first place, as well as your identity documents.
  • If cybercriminals took over your primary email account, make sure they cannot access other platforms and services linked to it, especially the ones with your bank card added as a payment method. Ideally, call the bank and ask to block all the cards you used for internet payments. Try to remove the compromised email from all accounts you still have control over. Criminals will easily log into most of them, having access to your email.
  • If your work email is under attack, immediately notify your employer and ask the tech department to block all access the email account has to sensitive business information.

An account takeover is something anyone may encounter at some point in their internet life. Following the above rules significantly reduces the risk of becoming a victim of ATO and losing all your most important accounts at once.

Hashtag: #OctaFX

The issuer is solely responsible for the content of this announcement.

About OctaFX

is a global broker that has been providing online trading services worldwide since 2011. It offers commission-free access to financial markets and a variety of services utilised by clients from 150 countries who have opened more than 12 million trading accounts. Free educational webinars, articles, and analytical and risk management tools the broker provides help traders reach their investment goals.

The company is involved in a comprehensive network of charity and humanitarian initiatives, including the improvement of educational infrastructure, short-notice relief projects, and supporting local communities and small to medium enterprises.

In the APAC region, it managed to capture the 'Decade Of Excellence In Forex Asia 2021' award and the 'Best Forex Broker Malaysia 2022' by Global Banking And Finance Review, World Finance, and Cfi.Co, respectively.

The Times Features

The Benefits of Animal-Assisted Speech Therapy For Children

Speech therapy has long been a standard for supporting children’s communication and emotional development. But what happens when you introduce a furry friend into the process? Th...

The Hidden Dangers of Blocked Drains and the Ultimate Solution for a Hassle-Free Home

Drain blockages are a big hassle to every homeowner and business owner alike. Whether it is a sink in the kitchen or bathroom, a clogged toilet, or a foul smell circulating aroun...

Understanding the Dangers of Ignoring a Gas Leak

Gas leaks are silent threats lurking within both homes and workplaces. A gas leak occurs when natural gas or any other gaseous substance escapes from a pipeline or containment. T...

Can You Sell Your House Privately in Queensland? Here’s How

Selling a house privately in Queensland is entirely possible and can be a cost-effective alternative to using a real estate agent. While agents provide valuable expertise, their co...

Itinerary to Maximize Your Two-Week Adventure in Vietnam and Cambodia

Two weeks may not seem like much, but it’s just the right time for travelers to explore the best of Vietnam and Cambodia. From the bustling streets of Hanoi to the magnificent te...

How to Protect Your Garden Trees from Wind Damage in Australia

In Australia's expansive landscape, garden trees hold noteworthy significance. They not only enhance the aesthetic appeal of our homes but also play an integral role in the local...

Times Magazine

CWU Assistive Tech Hub is Changing Lives: Win a Free Rollator Walker This Easter!

🌟 Mobility. Independence. Community. All in One. This Easter, the CWU Assistive Tech Hub is pleased to support the Banyule community by giving away a rollator walker. The giveaway will take place during the Macleod Village Easter Egg Hunt & Ma...

"Eternal Nurture" by Cara Barilla: A Timeless Collection of Wisdom and Healing

Renowned Sydney-born author and educator Cara Barilla has released her latest book, Eternal Nurture, a profound collection of inspirational quotes designed to support mindfulness, emotional healing, and personal growth. With a deep commitment to ...

How AI-Driven SEO Enhancements Can Improve Headless CMS Content Visibility

Whereas SEO (search engine optimization) is critical in the digital landscape for making connections to content, much of it is still done manually keyword research, metatags, final tweaks at publication requiring a human element that takes extensiv...

Crypto Expert John Fenga Reveals How Blockchain is Revolutionising Charity

One of the most persistent challenges in the charity sector is trust. Donors often wonder whether their contributions are being used effectively or if overhead costs consume a significant portion. Traditional fundraising methods can be opaque, with...

Navigating Parenting Arrangements in Australia: A Legal Guide for Parents

Understanding Parenting Arrangements in Australia. Child custody disputes are often one of the most emotionally charged aspects of separation or divorce. Parents naturally want what is best for their children, but the legal process of determining ...

Blocky Adventures: A Minecraft Movie Celebration for Your Wrist

The Minecraft movie is almost here—and it’s time to get excited! With the film set to hit theaters on April 4, 2025, fans have a brand-new reason to celebrate. To honor the upcoming blockbuster, watchfaces.co has released a special Minecraft-inspir...

LayBy Shopping