Anatomy of Account Takeover - Understanding Threats and Defenses
USENIX Enigma Conference via YouTube
Power BI Fundamentals - Create visualizations and dashboards from scratch
AI, Data Science & Business Certificates from Google, IBM & Microsoft
Overview
Syllabus
Intro
Online accounts are valuable targets
The three avenues of password theft
Commoditization of abuse
The wares on sale
Users reuse passwords
Hijacking likelihood* Compared to a general active account, how much more likely it is that you will be a victim of hacking if we know
Adoption of additional security is low
Sign-in risk detection
Dimensionality of risk
Geocloaking
Dynamic 2FA: Ask for additional verification
Choose the challenge that minimizes damage
Secondary e-mail verification
SMS code
Google Prompt
Hijacking monetization
Bringing the user into the loop
Finding the hijacker in-session
Taught by
USENIX Enigma Conference