In an earlier post, we explored the balancing act of reducing fraud in your applications without increasing friction for human users. In this post, I’d like to dig into how that balancing act is reflected in the tools in place to prevent account takeover (ATO) attacks, one of the most common vectors for fraud in web applications.
ATO attacks generally cost little to carry out, have a high success rate (due to generally poor password hygiene practices), and can be especially detrimental to both company reputation and the bottom line.
Options for preventing ATO attacks include deploying multi-factor authentication (MFA), using CAPTCHAs, and improving your bot defenses. But first, let’s define what these attacks look like and how they happen.
The two largest types of account takeover attacks are credential stuffing and credential cracking. Both of these rely in large part on an attacker having some or all of the information needed to break into an account before beginning the attack. Attackers often harvest these lists of partial or full credentials from data breaches elsewhere on the internet, and each breach starts a new wave of ATO attacks on other platforms.
Credential stuffing attacks occur when the attacker has a username/email and a password. The attacker takes this combination and plugs it into any web app they can find, searching for whichever logins shared login info with the breached platform.
Credential cracking attacks occur when the attacker has only some of the login info. Often referred to as “brute force attacks”, the attacker takes the information they do have and tries to guess at the other half of the information to get into the account.
Attackers typically use three main methods to carry out account takeover attacks:
Fraud and security teams have a number of tools and tactics at their disposal to fight back against the attackers. Approaching ATO with a defense-in-depth mindset is the safest way to go, as the most sophisticated attackers have developed mechanisms to bypass simpler protections:
CAPTCHA’s effectiveness in reducing fraud is limited and they certainly add friction. Undoubtedly, adding MFA to your application also introduces friction but it remains an important option in your defense against account takeovers. Anomaly analysis has its place, but fails when sophisticated bots mimic human behavior successfully.
Real-time bot management is essential in providing the ability to detect and enforce policies to stop bot traffic and reduce the risk of account takeover attacks. MFA is still valuable with effective bot detection. If automation is detected, enforcing MFA is one policy option you can use together with your bot management product. If you do plan to use MFA, the key to minimizing real user friction is to choose a bot management solution with the best detection effectiveness. By choosing the right bot management solution you can be sure that you’re only applying MFA friction to malicious bots not to real users. This means you preserve your engaging website and application experience - ensuring that it retains actual customers rather than irritating them with MFA.
So how do you choose the most effective solution? Remember those sophisticated bots running on compromised devices that we mentioned earlier? Apart from hosting malicious bots, the one thing that those residential machines will have in common, is that every device has been served advertisements at some point as its owner browses the web. If a device has been served an advertisement, HUMAN has already determined whether or not that device is running an ad fraud bot.
This is what makes HUMAN's BotGuard for Applications different. BotGuard collects and sends over 2,500 client-side signals indicative of bot activity to the Human Verification Platform for processing by more than 350 technical, statistical and machine learning algorithms. HUMAN verifies the humanity of more than two trillion interactions every day, harnessing internet-scale visibility and a decade’s worth of data to deliver continuously adaptive protection to customers that include the largest internet platforms. The Human Verification Engine enables BotGuard to detect fraud with unmatched effectiveness to ensure that only real humans interact with your applications.
BotGuard’s accuracy helps you minimize the use of MFA friction on real users, preserving your website and application experience and ensuring that it continues to engage and retain your customers. By filtering fraud before it reaches your site, BotGuard dramatically reduces your fraud team caseload and makes certain that your infrastructure runs efficiently and remains free of bot abuse.
With HUMAN Bot Defender you have the solution to reduce fraud and minimize friction. If you do decide to implement MFA, Bot Defender will ensure you’re only applying friction to malicious bots - not legitimate application users ensuring that only real humans interact with your applications.