Sticky Banner Visual Mobile 3

Spring deal: Get a free upgrade for 3 months on annual offers.

Spring deal: Free upgrade on annual offers. Claim now!

Claim Now!

Expressvpn Glossary

Account takeover

Account takeover

What is an account takeover?

An account takeover is a type of cyberattack where an intruder gains unauthorized access to an online account. This is often achieved by stealing valid login details and signing in as the account holder.

After gaining access, cybercriminals can typically bypass standard security checks because the login appears legitimate. They might take control of the account, change its security or recovery settings, and use it for fraud, data theft, or extortion.

How does an account takeover happen?

Account takeovers often start with attackers getting login information through one of the following ways:

  • Stealing credentials: Phishing, malware, or leaked credentials from data breaches and underground markets can expose usernames and passwords that are then reused across services.
  • Credential stuffing or brute force: Automated tools attempt large numbers of logins, either with known username/password pairs (credential stuffing) or by guessing passwords, until one works.
  • Session hijacking: An attacker steals an existing authenticated session from a browser or device to access an account without reentering the password.
  • Bypassing multi-factor authentication (MFA): Attackers may use MFA bombing (sending repeated approval requests until the user accepts one out of frustration), SIM swapping (transferring the victim's phone number to gain access to SMS codes), or social engineering to trick users into approving login attempts or sharing verification codes.How an account takeover can happen.

Common account takeover targets

Attackers often focus on accounts that provide financial value or access to sensitive data, or a way to unlock other accounts. These can include:

  • Banking and payment apps: These accounts can be used to transfer money, make unauthorized purchases, or commit financial fraud.
  • Email and cloud storage accounts: Access to email or stored files can expose sensitive data, enable password resets for other services, or facilitate identity theft.
  • Social media and messaging platforms: Compromised profiles can be used to impersonate account owners, send scams, spread malicious links, or damage reputations.
  • E-commerce and loyalty programs: These accounts may store saved payment details, addresses, or reward points that attackers can exploit.
  • Work accounts: Business accounts can provide access to internal systems, company data, and connected services through single sign-on (SSO) or Software-as-a-Service (SaaS) platforms.

Why is account takeover a threat?

Account takeovers can have long-lasting consequences for both individuals and organizations, including:

  • Financial loss: Attackers can transfer funds, make unauthorized purchases, or drain stored balances and reward points.
  • Identity risks and privacy exposure: Compromised accounts can expose private data, messages, and documents that attackers may use for fraud, impersonation, or additional attacks.
  • Loss of access to critical services: Victims may be locked out of essential accounts such as email or banking if attackers change recovery details or security settings, making password resets and account recovery more difficult.
  • Reputation damage: If attackers use compromised accounts to spread scams or malicious content, it can harm personal or professional relationships and trust.
  • Lateral movement: Attackers leverage compromised accounts and credentials to access connected services, reset other accounts, or move deeper into a corporate environment.
  • Regulatory and compliance risk: When an account takeovers result in personal data exposure, organizations may face reporting obligations, enforcement actions, or penalties under applicable privacy laws such as the California Consumer Privacy Act (CCPA) or the General Data Protection Regulation (GDPR).

Further reading

FAQ

What are the most common causes of account takeover?

Account takeovers often involve stolen login credentials or stolen authenticated sessions. Attackers commonly steal these through phishing messages, malware infections, data breaches, or by testing leaked email and password combinations across multiple services. Weak or reused passwords increase the risk.

How can someone tell if their account was taken over?

Signs of an account takeover may include unexpected password resets, unfamiliar login alerts, changes to account settings, unauthorized transactions, or messages sent from the account that the user didn’t create. Sometimes, users may lose access entirely if an attacker changes recovery details. Common targets of account takeovers include banking and payment apps, email accounts, and social media platforms.

Does changing a password stop an attacker?

Changing a password can help, but it doesn’t always stop an attacker on its own. If the attacker has already changed recovery settings, installed malware on the device, or gained persistent access through other means, additional steps may be required to fully secure the account.

Is MFA enough to prevent account takeover?

Multi-factor authentication (MFA) reduces the risk of account takeover, but it doesn’t eliminate it. Some MFA methods can be defeated through techniques such as phishing one-time codes, MFA fatigue (repeated push prompts), or SIM swapping to intercept SMS codes. MFA is strongest when combined with other controls, such as strong passwords and account monitoring.

What should someone do immediately after an account takeover?

After an account takeover, regaining control typically involves resetting the password, updating recovery details, and ending active sessions where possible. Reviewing recent activity for unauthorized transactions or changes can help minimize impact, including financial loss, privacy exposure, and reputational damage.
Get Started