Anatomy of Account Takeover - Understanding Threats and Defenses
USENIX Enigma Conference via YouTube
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Master Finance Tools - 35% Off CFI (Code CFI35)
Overview
Syllabus
Intro
Online accounts are valuable targets
The three avenues of password theft
Commoditization of abuse
The wares on sale
Users reuse passwords
Hijacking likelihood* Compared to a general active account, how much more likely it is that you will be a victim of hacking if we know
Adoption of additional security is low
Sign-in risk detection
Dimensionality of risk
Geocloaking
Dynamic 2FA: Ask for additional verification
Choose the challenge that minimizes damage
Secondary e-mail verification
SMS code
Google Prompt
Hijacking monetization
Bringing the user into the loop
Finding the hijacker in-session
Taught by
USENIX Enigma Conference