November 2, 2022 By Jennifer Gregory 2 min read

Last summer, I noticed password reset notices in my email account that I didn’t send. I quickly realized that I was the victim of an account takeover. This happens when someone illegally gains access to your account, typically through compromised credentials. I changed my email password right away and learned that my passwords to other accounts had already been changed. To make cleanup even more fun, I found out that the attackers had created new accounts using my credentials.

Account takeover at UK NHS

According to email security firm INKY, 139 employees at the National Health System (NHS) in the U.K. also found themselves victims of an account takeover in the past year. Their situation was similar to mine. The attacks started when attackers gained access to legitimate NHS email accounts. They then used the accounts to conduct phishing campaigns to steal Microsoft logins. The takeovers likely happened in October 2021. From there, the phishing schemes continued at least through April 2022. Attackers sent 1157 phishing emails sent from the NHS accounts.

To make the emails appear more honest, the attackers included the NHS email footer disclaimer at the bottom. They also used Microsoft and Adobe logos on emails where they pretended to be from each company. INKY reported that the attackers sent phishing emails through two NHS IP addresses, relays for processing high volumes of emails. In addition, all of the phishing emails sent from the compromised accounts passed the NHS authentication for outbound emails.

Account takeover fraud on the rise

Many cyber criminals use brute force attacks for account takeovers. Using an automated system, the attackers cast a wide net of commonly used passwords. From there they could gain access to accounts, mostly email accounts.

Preventing account takeovers

Account takeovers can cause consumers and businesses loss of time and money. You should take the following steps before account takeovers happen:

  • Use multifactor authentication to access the network and accounts. With two types of authentication required, it’s more challenging to gain unauthorized access. The risks get even lower when one of the methods uses biometrics.
  • Creating a culture of cybersecurity. When everyone in the company feels responsible for cybersecurity, employees are more likely to report suspicious emails and follow good online hygiene. However, leaders need to set a tone for the cybersecurity culture and make it a priority.
  • Stress the importance of using different passwords. When you use the same password for all accounts, the attacker can then break into all of your other accounts on the first try. By using different passwords, you buy yourself some time to notice the account takeover and take action before the threat actor accesses multiple accounts.
  • Use single-sign-on. Creating different passwords for every account adds pressure on employees. By using single sign-on, organizations keep accounts more secure without worrying about employees following the correct process.

Account takeovers can be devastating to the company and very time-consuming to recover. By proactively taking steps to reduce the risk of account takeover, organizations can reduce their vulnerability to these types of attacks.

More from News

Can memory-safe programming languages kill 70% of security bugs?

3 min read - The Office of the National Cyber Director (ONCD) recently released a new report, “Back to the Building Blocks: A Path Toward Secure and Measurable Software." The report is one of the first major announcements from new ONCD director Harry Coker and makes a strong case for adopting memory-safe programming languages. This new focus stems from the goal of rebalancing the responsibility of cybersecurity and realigning incentives in favor of long-term cybersecurity investments. Memory-safe programming languages were also included as a…

CISA hit by hackers, key systems taken offline

3 min read - The Cybersecurity and Infrastructure Security Agency (CISA) — responsible for cybersecurity and infrastructure protection across all levels of the United States government — has been hacked. “About a month ago, CISA identified activity indicating the exploitation of vulnerabilities in Ivanti products the agency uses,” a CISA spokesperson announced. In late February, CISA had already issued a warning that cyber threat actors are exploiting previously identified vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways. Ivanti Connect Secure is a…

DOJ’s crackdown: A brief look at hacker group takedowns

3 min read - The Department of Justice (DOJ) is ramping up efforts focused on disrupting cyber criminal organizations operating within and outside of United States borders. The dismantling of Volt Typhoon, a prolific hacker collective, marked a turning point in the DOJ's offensive against cyber crime syndicates. The group was notorious for its brazen cryptocurrency scams and heists. Through coordinated global law enforcement efforts, individuals linked to the organization were apprehended, assets were frozen and critical infrastructure was seized. The success of the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today