Account Takeover is a cyberattack in which an attacker assumes a victim’s identity by stealing their webmail login credentials. Attackers often use this stolen identity to send spam under the victim’s name. They can also carry out more complex scams—for example, changing the IBAN on an invoice so that a payment lands in the scammer’s account instead of the victim’s.
Attackers have relied on Account Takeover techniques for years. Their goal is to seize one or more users’ virtual identities, then exploit or sell them. To achieve this, they must obtain or guess victims’ passwords. Common methods include:
Mass credential-theft attacks focus on harvesting large lists of passwords to resell on the dark web. Those buyers can then launch fresh phishing campaigns to steal even more credentials.
When attackers research a specific target, the threat escalates. They aim for users with financial authority and then divert wire transfers into scammer accounts. This tactic underlies the so-called “fake CEO scam.”aunch new attacks —e.g. by sending phishing emails to retrieve further new credentials.
Employees and collaborators must train to recognize these scams. In a typical fake CEO scenario, they receive an urgent email from the “CEO” requesting a wire transfer and advising against follow-up questions because “he is in a meeting.”
Users should always:
A well-trained employee can thwart most phishing attempts before they succeed.
The company must adopt the most appropriate and up-to-date security measures. This is the most efficient way to help protect their employees email accounts. Generally, any access to administrative panels should involve adequate security measures, such as two-factor authentication, or restricted access from trusted IP addresses.
Workstations and smartphones must be protected by adequate anti-virus security systems. Furthermore, the company network must also be protected by a Next Generation Firewall —i.e. a firewall that not only is opening and closing ports, but is also analyzing network traffic to intercept potential risks when users browse the web or read emails.
The more measures and security levels are implemented (both procedural and technical), the more difficult it is for scammers to carry out cyberattack against your company.
A big responsibility is on the external digital providers that the company relies on for web hosting, for instance, and similar services. Service providers must equip themselves with adequate security measures and protection against any type of scams. In fact, in some cases, the attack takes place outside the company perimeter and cannot be detected in any way by the company security systems except, when it has already caused damage. Make sure to ask questions about cybersecurity, when looking for a new service provider.
Companies must implement robust, up-to-date security measures to protect email accounts:
The more layers you add, the harder you make it for attackers to succeed.
External service providers also share responsibility. Hosting or email vendors must enforce strong security—attacks that originate outside your perimeter often bypass your internal defenses until they inflict damage. Always ask potential providers about their cybersecurity measures before signing a contract.
Qboxmail’s cloud email platform includes built-in Account Takeover Protection:
By combining human vigilance with these technical defenses, Qboxmail ensures your corporate emails stay safe from Account Takeover attacks.