Last summer, I noticed password reset notices in my email account that I didn’t send. I quickly realized that I was the victim of an account takeover. This happens when someone illegally gains access to your account, typically through compromised credentials. I changed my email password right away and learned that my passwords to other accounts had already been changed. To make cleanup even more fun, I found out that the attackers had created new accounts using my credentials.

Account Takeover at UK NHS

According to email security firm INKY, 139 employees at the National Health System (NHS) in the U.K. also found themselves victims of an account takeover in the past year. Their situation was similar to mine. The attacks started when attackers gained access to legitimate NHS email accounts. They then used the accounts to conduct phishing campaigns to steal Microsoft logins. The takeovers likely happened in October 2021. From there, the phishing schemes continued at least through April 2022. Attackers sent 1157 phishing emails sent from the NHS accounts.

To make the emails appear more honest, the attackers included the NHS email footer disclaimer at the bottom. They also used Microsoft and Adobe logos on emails where they pretended to be from each company. INKY reported that the attackers sent phishing emails through two NHS IP addresses, relays for processing high volumes of emails. In addition, all of the phishing emails sent from the compromised accounts passed the NHS authentication for outbound emails.

Account Takeover Fraud on the Rise

Many cyber criminals use brute force attacks for account takeovers. Using an automated system, the attackers cast a wide net of commonly used passwords. From there they could gain access to accounts, mostly email accounts.

Preventing Account Takeovers

Account takeovers can cause consumers and businesses loss of time and money. You should take the following steps before account takeovers happen:

  • Use multifactor authentication to access the network and accounts. With two types of authentication required, it’s more challenging to gain unauthorized access. The risks get even lower when one of the methods uses biometrics.
  • Creating a culture of cybersecurity. When everyone in the company feels responsible for cybersecurity, employees are more likely to report suspicious emails and follow good online hygiene. However, leaders need to set a tone for the cybersecurity culture and make it a priority.
  • Stress the importance of using different passwords. When you use the same password for all accounts, the attacker can then break into all of your other accounts on the first try. By using different passwords, you buy yourself some time to notice the account takeover and take action before the threat actor accesses multiple accounts.
  • Use single-sign-on. Creating different passwords for every account adds pressure on employees. By using single sign-on, organizations keep accounts more secure without worrying about employees following the correct process.

Account takeovers can be devastating to the company and very time-consuming to recover. By proactively taking steps to reduce the risk of account takeover, organizations can reduce their vulnerability to these types of attacks.

More from News

LastPass Breaches Cast Doubt on Password Manager Safety

In 2022, LastPass suffered a string of security breaches which sparked concern among cyber professionals and those impacted by the intrusions. Some called into question the way LastPass handled and responded to the incident. In addition, the situation ignited a wider conversation about the risks linked to utilizing password managers. A password manager helps users generate strong passwords and safeguards them within a digital locker. A master password secures all data, which enables users to conveniently access all their passwords…

Good Guys Decrypt Ransomware Targeting Charitable Groups

Imagine you’re an IT manager amid a ransomware attack. While your team scrambles for solutions, the intruders demand a ransom. Of course, you don’t want to pay; you just want your files back. But as time ticks by and the extortionists turn up the heat, your bosses are about to give in and pay the ransom. But then, the FBI calls. “Don’t pay,” the agent says. “We’ve found someone who can crack the encryption.” Sound too good to be true?…

Threat Groups Offer $240k Salary to Tech Jobseekers

Dark web forums are home to various individuals interested in conducting illicit or questionable activities. These forums offer opportunities such as the transaction of stolen data, Malware-as-a-Service, hacking services and invitations to collaborate in hacktivism. Cyber crime team members are recruited directly from the source: the dark web. What does this activity look like? Kaspersky recently conducted an analysis of 155 dark web forums from January 2020 to June 2022. They examined job postings and resumes that contained information about…

Cryptocurrency-Related Crime Boomed in 2022

Cryptocurrency crime is flourishing, according to multiple year-end reports. For starters, cryptocurrency losses due to cyber theft rose to $3.7 billion last year. That’s a 58% increase over the $2.3 billion malicious actors stole from investors and exchanges in 2021, according to a new report by Immunefi. Meanwhile, illicit cryptocurrency activity reached an all-time high of $20.1 billion in 2022, a $2.1 billion increase from the previous year. The escalating U.S. sanctions targeting digital currencies have contributed to that rise,…