{"id":7416,"date":"2022-04-08T12:42:36","date_gmt":"2022-04-08T19:42:36","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7416"},"modified":"2023-04-05T12:34:01","modified_gmt":"2023-04-05T19:34:01","slug":"account-takeover-attack-ato-how-does-it-work","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/account-takeover-attack-ato-how-does-it-work\/","title":{"rendered":"Account Takeover Attack (ATO): How does it work?"},"content":{"rendered":"

What is an Account Takeover (ATO)?<\/h2>\n

Account Takeover is a type of cyberattack in which an attacker can take over a victim\u2019s user account through malicious means. This attack scenario does not involve the attacker being aware of the victim\u2019s sensitive credentials in advance to successfully gain access to an account. The login credentials or an active session of the victim using approaches (such as phishing, malware, man-in-the-middle attacks, and others) is required initially to compromise an account.<\/p>\n

Read on to learn more about Account Takeover Techniques.<\/p>\n

Techniques of Account Takeover<\/h2>\n

The following are the most common techniques used to take over a secured victim’s account.<\/p>\n

Cross-Site Request Forgery (CSRF)<\/h2>\n

If there is a CSRF vulnerability in the email\/phone change functionality, it can be abused to update the email\/phone of a victim, and a password reset can be performed.<\/p>\n

Password Reset Poisoning<\/h2>\n

If there is a host header injection vulnerability present in the application, it can be abused to poison the password reset token. The reset token can be accessed by the attacker if the host header is changed to an attacker-controlled domain. A CRLF injection can also be abused to inject a custom host header.<\/p>\n

https:\/\/youtu.be\/24IsNsLWtco<\/a><\/p>\n

Password Reset Token Leak<\/h2>\n

While requesting a reset password, the application may leak the reset password token in the response itself.<\/p>\n

No Rate Limiting<\/h2>\n

If there is no rate limiting on the password reset OTP input and the length of the OTP string is known, then this can be abused to brute force all possibilities of the OTP string, and the account can be taken over.<\/p>\n

Stealing OAuth Tokens<\/h2>\n

If an open redirect vulnerability exists in the OAuth flow of the application then the OAuth tokens can be stolen. The victim can be redirected to an attacker-controlled domain through the open redirect vulnerability and the token can be stolen.<\/p>\n

Response Manipulation<\/h2>\n

Take a look at the difference in the response between a successful and an unsuccessful login attempt. There may be a dependency that triggers a login or a password change. Change the unsuccessful response with the successful response and look for a possibility of account takeover.<\/p>\n

Username Collision<\/h2>\n

Sign up on an application with an existing username and add a white space before\/after the username. This will create a new account with a similar username. Reset the password of the malicious account. This may result in the victim\u2019s account takeover.<\/p>\n

https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-7245<\/a><\/p>\n

Insecure Direct Object References (IDOR)<\/h2>\n

If there is an IDOR vulnerability in the email\/phone change functionality, it can also be used to reset the password after updating the email\/phone of the victim.<\/p>\n

If the application implements some kind of user identifier in the password reset functionality then it can also be abused for account takeover through IDOR by updating the user identifier to the victim user.<\/p>\n

Parameter Pollution<\/h2>\n

Use parameter pollution to induce IDOR or parsing errors in the backend of the application during login or password reset. This may result in an account takeover.<\/p>\n

Example: email=victim@hello.world&email=hacker@hello.world<\/strong><\/p>\n

One of the most destructive major attacks is the account takeover attack, in which unscrupulous actors combine several account data and resell them on dark markets. The risk of account takeover exists for any company that provides credentials-protected accounts to employees or customers. This is why it is important for all organizations to be proactive in order to prevent serious account takeover issues.<\/p>\n

 <\/p>\n

Learn account takeover techniques in detail and how to prevent account takeovers in our blog series. Stay tuned to this page for more updates.<\/strong><\/p>\n

 <\/p>\n

Start Protecting your Credentials Today! Get in touch with CSW for Red Teaming and VMaaS services.<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

Account Takeover is a type of cyberattack in which an attacker can take over a victim\u2019s user account through malicious means.<\/p>\n","protected":false},"author":14,"featured_media":7404,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[80,109,127,146,137],"tags":[479,352,476,486,481,485,474,480,483,482,484],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7416"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/comments?post=7416"}],"version-history":[{"count":3,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7416\/revisions"}],"predecessor-version":[{"id":15184,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/posts\/7416\/revisions\/15184"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/7404"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=7416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/categories?post=7416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/tags?post=7416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}