November 2, 2022 By Jennifer Gregory 2 min read

Last summer, I noticed password reset notices in my email account that I didn’t send. I quickly realized that I was the victim of an account takeover. This happens when someone illegally gains access to your account, typically through compromised credentials. I changed my email password right away and learned that my passwords to other accounts had already been changed. To make cleanup even more fun, I found out that the attackers had created new accounts using my credentials.

Account takeover at UK NHS

According to email security firm INKY, 139 employees at the National Health System (NHS) in the U.K. also found themselves victims of an account takeover in the past year. Their situation was similar to mine. The attacks started when attackers gained access to legitimate NHS email accounts. They then used the accounts to conduct phishing campaigns to steal Microsoft logins. The takeovers likely happened in October 2021. From there, the phishing schemes continued at least through April 2022. Attackers sent 1157 phishing emails sent from the NHS accounts.

To make the emails appear more honest, the attackers included the NHS email footer disclaimer at the bottom. They also used Microsoft and Adobe logos on emails where they pretended to be from each company. INKY reported that the attackers sent phishing emails through two NHS IP addresses, relays for processing high volumes of emails. In addition, all of the phishing emails sent from the compromised accounts passed the NHS authentication for outbound emails.

Account takeover fraud on the rise

Many cyber criminals use brute force attacks for account takeovers. Using an automated system, the attackers cast a wide net of commonly used passwords. From there they could gain access to accounts, mostly email accounts.

Preventing account takeovers

Account takeovers can cause consumers and businesses loss of time and money. You should take the following steps before account takeovers happen:

  • Use multifactor authentication to access the network and accounts. With two types of authentication required, it’s more challenging to gain unauthorized access. The risks get even lower when one of the methods uses biometrics.
  • Creating a culture of cybersecurity. When everyone in the company feels responsible for cybersecurity, employees are more likely to report suspicious emails and follow good online hygiene. However, leaders need to set a tone for the cybersecurity culture and make it a priority.
  • Stress the importance of using different passwords. When you use the same password for all accounts, the attacker can then break into all of your other accounts on the first try. By using different passwords, you buy yourself some time to notice the account takeover and take action before the threat actor accesses multiple accounts.
  • Use single-sign-on. Creating different passwords for every account adds pressure on employees. By using single sign-on, organizations keep accounts more secure without worrying about employees following the correct process.

Account takeovers can be devastating to the company and very time-consuming to recover. By proactively taking steps to reduce the risk of account takeover, organizations can reduce their vulnerability to these types of attacks.

More from News

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally.The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets.Who is exploiting the NGFW zero-day?As of now, little is known about the actors behind the…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

CISA adds Microsoft SharePoint vulnerability to the KEV Catalog

3 min read - In late October, the United States Cybersecurity & Infrastructure Security Agency (CISA) added a new threat to its Known Exploited Vulnerability (KEV) Catalog. Cyber criminals used remote code execution vulnerability in Microsoft SharePoint to gain access to organizations’ networks. The CISA press release states that “these types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.” However, Microsoft identified and released a patch for this vulnerability in July 2024. Cybersecurity experts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today