Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Identity theft and account takeover: attacks and protective measures

How attackers take over accounts and misuse identities: credential stuffing, password spraying, SIM swapping, and MFA bypass techniques. Protective measures for businesses using Microsoft Sentinel, Conditional Access, and FIDO2.

Summary: Account takeover (ATO) refers to the unauthorized takeover of user accounts by attackers. Attack vectors: credential stuffing (leaked passwords), brute force, phishing/MFA bypass, session hijacking, password reset vulnerabilities, and SIM swapping. ATO is the starting point for fraud, data breaches, and privilege escalation. Detection: impossible travel, device fingerprinting anomalies, velocity checks.

Sources & References

  1. [1] NIST Special Publication 800-63B Digital Identity Guidelines - NIST
  2. [2] ENISA Threat Landscape: Identity Theft - ENISA

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Jan Hörnemann
Jan Hörnemann

Chief Operating Officer · Prokurist

E-Mail

M.Sc. Internet-Sicherheit (if(is), Westfälische Hochschule). COO und Prokurist mit Expertise in Informationssicherheitsberatung und Security Awareness. Nachwuchsprofessor für Cyber Security an der FOM Hochschule, CISO-Referent bei der isits AG und Promovend am Graduierteninstitut NRW.

11 Publikationen
ISO 27001 Lead Auditor (PECB/TÜV) T.I.S.P. (TeleTrusT) ITIL 4 (PeopleCert) BSI IT-Grundschutz-Praktiker (DGI) Ext. ISB (TÜV) BSI CyberRisikoCheck CEH (EC-Council)
This article was last edited on 03/29/2026. Responsible: Jan Hörnemann, Chief Operating Officer · Prokurist at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"