Account Takeover
Also known as: ATO
An attack where a fraudster gains control of a legitimate user's account — typically through credential theft — and then uses it to steal funds, data, or reputation.
Last updated:
What is account takeover?
Account takeover (often abbreviated ATO) is the endpoint of a successful credential-based attack: the attacker is now logged in as the victim, with the victim's full permissions, and the application has no way to distinguish them from the real user. The pre-attack phase uses phishing, credential stuffing, brute force, SIM swapping, session-cookie theft, or malware to obtain the credentials or session. What happens next depends on the kind of account.
ATO by account type
- Bank and brokerage accounts — drain funds, change wire-transfer instructions, open lines of credit against the victim's assets
- Email accounts — reset passwords on every other service the victim uses, since password-reset links land in the inbox; one compromised email often cascades to a dozen more compromises
- E-commerce accounts — order high-value goods shipped to a reshipping address, commit carding with stored cards
- Social media accounts — DM the victim's contacts with phishing links or crypto scams, using the victim's reputation as social proof
- SaaS/corporate accounts — exfiltrate customer data, insert persistent access, move laterally into other accounts
Detection and defense
Detection focuses on "unusual for this user" signals: a login from a country they've never been to, a device fingerprint that doesn't match, a login time outside their normal pattern, or a password change followed immediately by a high-value transaction. IP reputation layers on top — a login from a datacenter or residential-proxy IP for a user who normally logs in from a single home ISP is a strong ATO signal. Defenses combine MFA (usually breaks ATO even when the password is known), session reauthentication on sensitive actions, and downstream anomaly scoring. Running the login IP through an IP abuse report checker flags attempts from known-abuse infrastructure.