, , ,

Battling account takeover and identity theft: effective countermeasures revealed

Account takeover is a serious threat to everyone. Cybersecurity experts have warned about this issue for years, and we must take it seriously. Our credentials being leaked can result in identity theft and cause significant harm to us. While there are resources available for users to check if their details have been compromised, it's essential to understand that by the time your username and password have been leaked, cybercriminals will likely have had access to them for at least six months.

Preventing breaches requires a lot of effort, but assuming that a breach is always possible is essential. How can companies detect breaches, identify data, and protect it before it gets leaked? A massive amount of data is mined through dark web monitoring, and many automated free and commercial tools can be used as a valuable line of defense. The most common types are scanners that search through lists of stolen data “dumped” online. This stolen data can be anything useful to a person or entity, meaning there could be a lot of data to search for.

Most obviously, for consumers, this relates to user credentials from compromised accounts, but it could also include social security or National Insurance numbers, passport details, or financial data. The most well-known consumer tool for people to see their exposure is Have I Been Pwned?, which allows individual users to scan for their details. More recently, we have seen exciting developments in tools focusing on consumer data and company company specifications ranging from standalone documents to intellectual property. This has value to any organization or enterprise concerned about exposure to cyberattacks.

The challenge for all dark web monitoring tools is dealing with scale, relevancy, and speed of information. When it comes to scale, it’s hard to estimate how large the dark web is as a subset of the wider deep web, especially considering it is several hundred times larger than the standard internet we access daily. This means scanning tools must be able to identify and focus on dark web locations. This is where relevancy and the speed of identifying data apply because much of it is only dumped into dark web forums after criminals have had their use out of it. Multiple dumps of the same data are also often made across different forums and sources; in our experience, this is the case for 70% of the data we find.

Companies use more advanced processes and skilled cyber personnel to address the need for speed, as more sophisticated techniques are required to find actionable breach data. One method is to become an active part of the dark web community. This doesn’t mean becoming a criminal or hacker. Still, to identify and stop them, we need to view things from the attacker’s perspective, identifying hacker groups and understanding how the process works. For example, a hacker may have the complex skills needed to expose company systems and access credentials but may be faced with an encrypted password database. Unless they can decrypt that data, what they have is useless. So, what do they do with that data? Sell it? Mine it? They don’t necessarily have all these skills, so they will turn to the dark web to find people offering decrypting and monetization services.

Researchers – real humans – are part of this community through a network of pseudo-identities (sockpuppets), and analysts monitor hacker activity in specific locations known to specialize in stolen data. For security companies, this means going deep into the community to find people, places, and methods for identifying miscreants. We can engage with them before data is available in an unencrypted form on the dark web. This reduces the detection part of the process to a few weeks instead of six months, increasing the likelihood that data can be identified before it is usable. Companies affected by a hacker takeover can proactively manage end-user accounts and limit the risk of fraud or identity theft.

Account takeover continues to be a genuine threat, but basic cybersecurity hygiene can help mitigate this in the first instance. The common denominator with any online account is that they all need a password to be accessed. While most people know they should be using strong, unique passwords and phrases for every account, it can be challenging to remember which credentials they need to be using. It’s why we, and all our industry colleagues, recommend using a password manager. Why make life more complicated when you don’t have to?

More from TechRadar Pro

https://www.techradar.com/news/from-account-takeover-to-identity-theft-what-can-be-done


January 2025
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  

About Us

Welcome to encircle News! We are a cutting-edge technology news company that is dedicated to bringing you the latest and greatest in everything tech. From automobiles to drones, software to hardware, we’ve got you covered.

At encircle News, we believe that technology is more than just a tool, it’s a way of life. And we’re here to help you stay on top of all the latest trends and developments in this ever-evolving field. We know that technology is constantly changing, and that can be overwhelming, but we’re here to make it easy for you to keep up.

We’re a team of tech enthusiasts who are passionate about everything tech and love to share our knowledge with others. We believe that technology should be accessible to everyone, and we’re here to make sure it is. Our mission is to provide you with fun, engaging, and informative content that helps you to understand and embrace the latest technologies.

From the newest cars on the road to the latest drones taking to the skies, we’ve got you covered. We also dive deep into the world of software and hardware, bringing you the latest updates on everything from operating systems to processors.

So whether you’re a tech enthusiast, a business professional, or just someone who wants to stay up-to-date on the latest advancements in technology, encircle News is the place for you. Join us on this exciting journey and be a part of shaping the future.

Podcasts

TWiT 1013: Calamari in Crisis – Touching the Sun, Fake Spotify Artists, Banished Words This Week in Tech (Audio)

Touching the Sun, Fake Spotify Artists, Banished Words AI Needs So Much Power, It's Making Yours Worse How many billions Big Tech spent on AI data centers in 2024 NASA Spacecraft 'Touches Sun' In Defining Moment For Humankind Elon Musk Calls Out NASA's Moon Ambitions: 'We're Going Straight to Mars' Elon Musk and the right's war on Wikipedia Trump Asks Supreme Court to Pause Law Threatening TikTok Ban US Treasury says Chinese hackers stole documents in 'major incident' Judge blocks parts of California bid to protect kids from social media Finland probes Russian shadow fleet oil tanker after cable-cutting incident US appeals court blocks Biden administration effort to restore net-neutrality rules The Ghosts in the Machine (fake spotify artists) Massive VW Data Leak Exposed 800,000 EV Owners' Movements, From Homes To Brothels Banished Words | Lake Superior State University 2025 Public Domain Day 2025 Happy Birthday, Bitcoin! The top cryptocurrency is old enough to drive End of the lines? QR-style codes could replace barcodes 'within two years' Host: Leo Laporte Guests: Richard Campbell, Anthony Ha, and Stacey Higginbotham Download or subscribe to This Week in Tech at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/Twit joindeleteme.com/twit promo code TWIT canary.tools/twit – use code: TWIT zscaler.com/security
  1. TWiT 1013: Calamari in Crisis – Touching the Sun, Fake Spotify Artists, Banished Words
  2. TWiT 1012: Our Best Of 2024 – The Best Moments From TWiT's 2024
  3. TWiT 1011: The Year in Review – A Look at the Top Stories of 2024
  4. TWiT 1010: The Densest State in the US – TikTok Ban, Drones Over Jersey, GM Quits Robotaxis
  5. TWiT 1009: Andy Giveth & Bill Taketh Away – Trump's Tech Titans, Crypto Boom, TikTok's US Ban, Intel CEO Exits