Normal view

Received before yesterday

Account Takeover Scams Surge as FBI Reports Over $262 Million in Losses

26 November 2025 at 00:34

Account Takeover fraud

The Account Takeover fraud threat is accelerating across the United States, prompting the Federal Bureau of Investigation (FBI) to issue a new alert warning individuals, businesses, and organizations of all sizes to stay vigilant. According to the FBI Internet Crime Complaint Center (IC3), more than 5,100 complaints related to ATO fraud have been filed since January 2025, with reported losses exceeding $262 million. The bureau warns that cyber criminals are increasingly impersonating financial institutions to steal money or sensitive information. As the annual Black Friday sale draws millions of shoppers online, the FBI notes that the surge in digital purchases creates an ideal environment for Account Takeover fraud. With consumers frequently visiting unfamiliar retail websites and acting quickly to secure limited-time deals, cyber criminals deploy fake customer support calls, phishing pages, and fraudulent ads disguised as payment or discount portals. The increased online activity during Black Friday makes it easier for attackers to blend in and harder for victims to notice red flags, making the shopping season a lucrative window for ATO scams.

How Account Takeover Fraud Works

In an ATO scheme, cyber criminals gain unauthorized access to online financial, payroll, or health savings accounts. Their goal is simple: steal funds or gather personal data that can be reused for additional fraudulent activities. The FBI notes that these attacks often start with impersonation, either of a financial institution’s staff, customer support teams, or even the institution’s official website. To carry out their schemes, criminals rely heavily on social engineering and phishing websites designed to look identical to legitimate portals. These tactics create a false sense of trust, encouraging account owners to unknowingly hand over their login credentials.

Social Engineering Tactics Increase in Frequency

The FBI highlights that most ATO cases begin with social engineering, where cyber criminals manipulate victims into sharing sensitive information such as passwords, multi-factor authentication (MFA) codes, or one-time passcodes (OTP). Common techniques include:
  • Fraudulent text messages, emails, or calls claiming unusual activity or unauthorized charges. Victims are often directed to click on phishing links or speak to fake customer support representatives.
  • Attackers posing as bank employees or technical support agents who convince victims to share login details under the guise of preventing fraudulent transactions.
  • Scenarios where cyber criminals claim the victim’s identity was used to make unlawful purchases—sometimes involving firearms, and escalate the scam by introducing another impersonator posing as law enforcement.
Once armed with stolen credentials, criminals reset account passwords and gain full control, locking legitimate users out of their own accounts.

Phishing Websites and SEO Poisoning Drive More Losses

Another growing trend is the use of sophisticated phishing domains and websites that perfectly mimic authentic financial institution portals. Victims believe they are logging into their bank or payroll system, but instead, they are handing their details directly to attackers. The FBI also warns about SEO poisoning, a method in which cyber criminals purchase search engine ads or manipulate search rankings to make fraudulent sites appear legitimate. When victims search for their bank online, these deceptive ads redirect them to phishing sites that capture their login information. Once attackers secure access, they rapidly transfer funds to criminal-controlled accounts—many linked to cryptocurrency wallets—making transactions difficult to trace or recover.

How to Stay Protected Against ATO Fraud

The FBI urges customers and businesses to take proactive measures to defend against ATO fraud attempts:
  • Limit personal information shared publicly, especially on social media.
  • Monitor financial accounts regularly for missing deposits, unauthorized withdrawals, or suspicious wire transfers.
  • Use unique, complex passwords and enable MFA on all accounts.
  • Bookmark financial websites and avoid clicking on search engine ads or unsolicited links.
  • Treat unexpected calls, emails, or texts claiming to be from a bank with skepticism.

What To Do If You Experience an Account Takeover

Victims of ATO fraud are advised to act quickly:
  1. Contact your financial institution immediately to request recalls or reversals, and report the incident to IC3.gov.
  2. Reset all compromised credentials, including any accounts using the same passwords.
  3. File a detailed complaint at IC3.gov with all relevant information, such as impersonated institutions, phishing links, emails, or phone numbers used.
  4. Notify the impersonated company so it can warn others and request fraudulent sites be taken down.
  5. Stay informed through updated alerts and advisories published on IC3.gov.

Signing In to Online Accounts

Explore secure methods for signing into online accounts, including SSO, MFA, and password management. Learn how CIAM solutions enhance security and user experience for enterprises.

The post Signing In to Online Accounts appeared first on Security Boulevard.

Authentication Provider Types: A Guide to Best Practices

Explore different authentication provider types (social, passwordless, MFA) and learn best practices for choosing the right one to enhance security and user experience in your applications.

The post Authentication Provider Types: A Guide to Best Practices appeared first on Security Boulevard.

The Shift Toward Zero-Trust Architecture in Cloud Environments 

7 November 2025 at 06:18
remote, ZTNA, security, zero-trust architecture, organization, zero-trust, trust supply chain third-party

As businesses grapple with the security challenges of protecting their data in the cloud, several security strategies have emerged to safeguard digital assets and ensure compliance. One such security strategy is called zero-trust security. Zero-trust architecture fosters the ‘never trust, always verify’ principle and emphasizes the need to authenticate users without trust. Contrary to traditional security approaches that leverage perimeter-based security, zero-trust architecture assumes that threats exist outside as well..

The post The Shift Toward Zero-Trust Architecture in Cloud Environments  appeared first on Security Boulevard.

Why “Secure Login” Isn’t Enough to Protect Your Mobile App Anymore

30 October 2025 at 02:57

mobile app security

Manish Mimani, founder and CEO of Protectt.ai For years, static passwords, dynamic One-time Passwords (OTPs), and Multi-factor Authentication (MFA) have been the foundation of mobile app security. They have helped users verify their identities and kept unauthorized access at bay. But today, that’s no longer enough. Modern fraudsters aren’t just trying to break through login screens — they are targeting what happens after you log in. Post-authentication fraud is rising at an alarming pace across mobile-first industries like BFSI, fintech, and digital commerce. Fraudsters bypass identity checks altogether by compromising runtime environments, targeting APIs, or exploiting device vulnerabilities, often without ever touching credentials. The biggest misconception in mobile app security today is: If the login is secure, the app is secure. That couldn’t be further from the truth!

Mobile App Security Risks Don’t Stop at Login

Runtime Blind Spots: Once users log in, most apps assume the environment is safe. It is not.
  • Malware, repackaged apps, and overlay attacks exploit runtime weaknesses.
  • Fraudsters hijack active sessions and execute transactions from within.
Compromised Devices: A secure app on a rooted or jailbroken device is vulnerable.
  • Malicious keyboard overlays, screen sharing, and unsafe environments open hidden backdoors.
Unsecured APIs: Many fraudsters bypass the UI entirely.
  • Weak APIs are prime targets for token replay, man-in-the-middle exploits, and automated fraud.
Result: Fraud happens after successful authentication — where most defences do not exist.

The Solution: Build Defence Inside the App

To counter post-authentication threats, security must be intrinsic; not just guard the login. Embed Protection with Runtime Application Self-Protection (RASP)
  • RASP sits inside the application, detecting and blocking malicious activity the moment it occurs.
  • It thwarts tampering, reverse engineering, overlay attacks, and session hijacking in real time.
  • Unlike static perimeter defences, RASP protects every user interaction across any network, device, or location. It transforms your app from a passive target into an active shield.
Enforce Continuous Device Integrity
  • Validate the trustworthiness of the device at every step.
  • Detect rooted or jailbroken devices, malicious tools, or unsafe conditions.
  • Apply adaptive responses — restrict high-risk functions or block sensitive actions entirely.
Secure the API Layer End-to-End
  • Treat APIs as critical attack surfaces.
  • Harden with encryption, authentication, behavioural monitoring, and anomaly detection.
  • Stop fraud before it can bypass the UI.
Authentication Is Just the Start Login protection is necessary, but no longer sufficient. True mobile app security is layered:
  • RASP for in-app runtime defence.
  • Device Integrity for trusted environments.
  • API Protection for invisible attack surfaces.
Fraudsters have evolved. Thus, security must be built inside, not just around. The challenge is no longer just about the OTP; it is also about what happens after the OTP is validated. For mobile-first industries like BFSI, fintech, and digital commerce, the mobile app security of their business empires depends entirely on this strategic shift. Authentication starts the journey; RASP ensures protection every step of the way.
❌