Monday, May 19, 2025

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Creators Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Account Takeover Fraud in Retail: How to Prevent Online Attacks

SBN

Account Takeover Fraud in Retail: How to Prevent Online Attacks

by DataDome on March 19, 2024

Why is the retail industry a target for account takeover fraud?

1. A Rich Data Environment

Retailers typically store large amounts of sensitive data, including customer personal information, payment details, and purchase history. This treasure trove of data makes them an attractive target for many different types of e-commerce fraud, because cybercriminals want to exploit that valuable information for financial gain.

2. High Transaction Volume

The retail industry is characterized by high volumes of online transactions, especially with the continued growth of e-commerce platforms. This high transaction volume explains the prevalence of bot threats in retail, because it gives cybercriminals many opportunities to launch automated attacks aimed at compromising customer accounts.

Techstrong Gang Youtube
AWS Hub

3. Ease of Access

With the explosive growth of online shopping channels and the widespread adoption of digital payment methods, retail accounts have become easier targets for cybercriminals. Additionally, the convenience of single sign-on and social login features may accidentally simplify the process for attackers to gain unauthorized access to customer accounts.

These reasons underscore the importance of e-commerce fraud prevention software and other robust cybersecurity measures to protect sensitive customer information.

What are the consequences of account takeover for retailers?

A successful account takeover (ATO) attack can have far-reaching consequences for any retailer, regardless of its size. Here are the key ramifications:

  • Financial Losses: ATO attacks lead to fraudulent transactions, chargebacks and refunds, and increased operational costs from remediation efforts. Combined, these losses can erode a retailer’s profit margin.
  • Damage to Reputation: Customers expect retailers to protect their personal and financial information. A successful ATO attack breaks that trust and leads to a drop in existing customers and fewer new customers. Rebuilding that trust takes time and effort.
  • Customer Impact: Customers whose accounts have been compromised will feel inconvenienced, frustrated, and anxious as they navigate the fallout of unauthorized transactions, account lockouts, and worries about identity theft.
  • Regulatory Compliance: Retailers will face regulatory scrutiny and legal repercussions if they fail to adequately protect their customers’ data and privacy. This non-compliance can result in heavy regulatory fees and legal costs.
  • Long-Term Business Implications: An ATO incident will negatively impact a retailer’s market positioning and competitiveness, because it will be harder to convince new customers and retain existing customers.

In summary, the consequences of ATO attacks in the retail industry extend beyond the immediate financial losses. They also lead to reputational damage, dissatisfied customers, regulatory scrutiny, and other long-term business implications.

Proactive measures like payment fraud detection can detect and mitigate ATO attacks. Such cybersecurity measures become a must-have for retailers who want to safeguard their operations, reputation, and bottom line.

Common Methods Used for Account Takeover in Retail

Phishing Attacks

Cybercriminals try to obtain user credentials through phishing attacks like email phishing or SMS phishing (smishing), where they send deceptive emails or texts to trick recipients into clicking malicious links or providing their account credentials.

Credential Stuffing

Cybercriminals either reuse stolen credentials from data breaches or the dark web or use sophisticated automated tools to find their way into user accounts. They often do so at scale, targeting multiple retail platforms simultaneously.

Brute Force Attacks

Similar to credential stuffing, cybercriminals use automated scripts or tools to systematically guess login credentials, by trying multiple combinations of usernames and passwords until a match is found. They often do this with precompiled lists or commonly used passwords or dictionary words (called a dictionary attack) to expedite the brute force process and increase their chances of success.

Account Takeover through Social Engineering

Cybercriminals sometimes impersonate legitimate customers or support representatives to trick retail employees or customer service agents into disclosing account credentials or resetting passwords. Alternatively, sometimes they exploit lax verification processes or inadequate authentication mechanisms to fraudulently reset passwords or go around security controls.

Malware and Keylogging

Cybercriminals use malware to infect devices and capture sensitive information entered by retail customers. For example, keylogging software can silently record keystrokes entered by the users of an infected device, capturing all kinds of confidential information without their knowledge.

Network Interception Attacks

Cybercriminals can intercept and manipulate the communication between retail customers and retailers themselves, for example by exploiting vulnerabilities in unsecured wifi networks or compromised routers or by hijacking authenticated sessions to bypass authentication mechanisms.

See DataDome in Action

Start measuring bot attacks today and find out which malicious bots are attacking your site.


Book a Demo


Watch a Demo

Preventing Account Takeover Fraud in Retail

1. Implement Multi-Factor Authentication (MFA)

MFA requires users to provide multiple forms of authentication to access their accounts, such as passwords, one-time codes sent via SMS or email, and biometric authentication. This extra layer of protection often eliminates the risk of ATO even if someone’s login credentials have been compromised.

2. Enforce Strong Password Policies

Nudge users towards strong unique passwords by enforcing a minimum length, complexity, and diversity. Additionally, prompt them to update their passwords regularly to minimize the risk of compromised credentials due to data breaches or leaks.

3. Use Fraud Detection Tools

Fraud detection solutions leverage machine learning to analyze user behavior and identify unusual activities that may indicate ATO attempts. It’s important to always keep an eye on unusual login activities, multiple failed login attempts, or sudden changes in account activity.

4. Enable IP Geolocation Filtering

Restrict access to user accounts based on a user’s IP geolocation. Additionally, block login attempts from known regions of malicious activity or regions where you don’t do business. Even better, use dynamic geolocation filters that adjust security controls based on evolving threat intelligence and risk profiles.

5. Use ATO Protection Software

Specialized ATO protection software like DataDome will proactively defend your business and its users against account takeover fraud and other bot threats in retail that target websites, mobile apps, and APIs.  DataDome’s advanced bot management capabilities can identify and mitigate malicious bots trying to exploit vulnerabilities, abuse your APIs, or engage in other fraudulent activities. 

DataDome is continuously updated with the latest insights into emerging threats and attack vectors, so retailers always stay ahead of the newest and most sophisticated cybersecurity threats.

See DataDome in Action

Start measuring bot attacks today and find out which malicious bots are attacking your site.


Book a Demo


Watch a Demo

Real-Life Examples of ATO in Retail

Amazon Enhances MFA Requirements

Amazon’s popular cloud service AWS announced that they were strengthening their security posture by requiring the use of MFA for the root users of AWS management accounts. While many retailers are still cautious about forcing customers into MFA, this simple requirement will immediately and significantly reduce the risk of ATO attacks for AWS accounts. It’s in line with Amazon’s dedication to user security.

Shopify’s Lax Password Requirements

Shopify user passwords have to be at least five characters long. Unfortunately, passwords that are exactly five characters long are easy to break with a robust brute force attack. Shopify could immediately improve the security of its users by requiring passwords to be at least fifteen characters long. They could also require their users to change their passwords at least once a year.

BlaBlaCar Uses Advanced ATO Software

BlaBlaCar is the largest community of carpoolers in the world. But they were observing a large number of bots try to take control of user accounts on their website. So they installed DataDome to monitor and prevent these bot attacks. Since then, DataDome has protected BlaBlaCar’s user accounts without requiring maintenance and without impacting web and app performance. 

Setting up DataDome is insurance. You can live without one, but you need to know that if you do, you are putting yourself at risk.

Francis Nappez, BlaBlaCar CTO

Key Takeaways

Account takeover fraud poses a significant threat to the retail industry. Cybercriminals use various tactics like credential stuffing, brute force attacks, malware, and more to compromise accounts and steal sensitive information. 

Retailers can reduce this risk by implementing MFA, enforcing strong password policies, using fraud detection tools and IP geolocation filters, and installing specialized ATO protection software like DataDome. Doing so is crucial to safeguard customer trust, preserve your brand’s reputation, and stay financially stable. 

Don’t wait until it’s too late. Book a live DataDome demo today to understand how advanced ATO software can immediately improve the security of your business and its customers.

*** This is a Security Bloggers Network syndicated blog from DataDome authored by DataDome. Read the original post at: https://datadome.co/learning-center/account-takeover-fraud-retail/

March 19, 2024March 19, 2024 DataDome account takeover, learning center, online fraud
  • ← Beyond PHP EOL: An Upgrade Dilemma
  • Recent Node.js Vulnerabilities Fixed in Ubuntu →

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Software Supply Chain Security: Navigating NIST, CRA, and FDA Regulations
Is DevEx the Same as DevSecOps?

Podcast

Listen to all of our podcasts

Press Releases

GoPlus's Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

C2A Security’s EVSec Risk Management and Automation Platform Gains Traction in Automotive Industry as Companies Seek to Efficiently Meet Regulatory Requirements

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

Zama Raises $73M in Series A Lead by Multicoin Capital and Protocol Labs to Commercialize Fully Homomorphic Encryption

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

RSM US Deploys Stellar Cyber Open XDR Platform to Secure Clients

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Subscribe to our Newsletters

ThreatLocker

Most Read on the Boulevard

As US CVE Database Fumbles, EU ‘Replacement’ Goes Live
Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)
DHS Cancels $2.4 Billion Leidos Contract, Cites Changes at CISA
IBM Reasserts Its Identity: A Modern Security Partner Rooted in Experience
Linux Foundation Shares Framework for Building Effective Cybersecurity Teams
Coinbase Hacked and Turns the Tables on the Cybercriminals!
89 Million Steam Accounts Compromised: Change Your Password Now
The Coinbase Data Breach: A Breakdown of What Went Wrong
Hacking the Hardware Brains of Computers is the Ultimate Cyberattack
Developer Leaks API Key for Private Tesla, SpaceX LLMs

Industry Spotlight

Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty
Cloud Security Cybersecurity Data Privacy Data Security Featured Identity & Access Industry Spotlight Network Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches 

Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty

May 16, 2025 Jeffrey Burt | 2 days ago 0
Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)
Analytics & Intelligence Cloud Security Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)

May 15, 2025 Richi Jennings | 3 days ago 0
As US CVE Database Fumbles, EU ‘Replacement’ Goes Live
Application Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security DevOps Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Industry Spotlight IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight Threats & Breaches Vulnerabilities 

As US CVE Database Fumbles, EU ‘Replacement’ Goes Live

May 14, 2025 Richi Jennings | 4 days ago 0

Top Stories

Linux Foundation Shares Framework for Building Effective Cybersecurity Teams
Cybersecurity Featured News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Linux Foundation Shares Framework for Building Effective Cybersecurity Teams

May 16, 2025 Michael Vizard | 2 days ago 0
DHS Cancels $2.4 Billion Leidos Contract, Cites Changes at CISA
Cyberlaw Cybersecurity Featured Governance, Risk & Compliance Network Security News Security Awareness Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

DHS Cancels $2.4 Billion Leidos Contract, Cites Changes at CISA

May 15, 2025 Jeffrey Burt | 3 days ago 0
Apple Device Users Can File Claims in $95 Million Siri Spying Settlement
Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security Featured Governance, Risk & Compliance Mobile Security News Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

Apple Device Users Can File Claims in $95 Million Siri Spying Settlement

May 13, 2025 Jeffrey Burt | May 13 0

Security Humor

A spider from above

Warning to US Retail: ‘Scattered Spider’ Targets YOU (with DragonForce Ransomware)

Download Free eBook

Managing the AppSec Toolstack

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Creators Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2025 Techstrong Group Inc. All rights reserved.
×

Security in AI

Step 1 of 7

14%
How would you best describe your organization's current stage of securing the use of generative AI in your applications?(Required)
Have you implemented, or are you planning to implement, zero trust security for the AI your organization uses or develops?(Required)
What are the three biggest challenges your organization faces when integrating generative AI into applications or workflows? (Select up to three)(Required)
How does your organization secure proprietary information used in AI training, tuning, or retrieval-augmented generation (RAG)? (Select all that apply)(Required)
Which of the following kinds of tools are you currently using to secure your organization’s use of generative AI? (select all that apply)(Required)
How valuable do you think it would it be to have a solution that classifies and quantifies risks associated with generative AI tools?(Required)
What are, or do you think would be, the most important reasons for implementing generative AI security measures? (Select up to three)(Required)

×