Главная
Study mode:
on
1
Intro
2
Online accounts are valuable targets
3
The three avenues of password theft
4
Commoditization of abuse
5
The wares on sale
6
Users reuse passwords
7
Hijacking likelihood* Compared to a general active account, how much more likely it is that you will be a victim of hacking if we know
8
Adoption of additional security is low
9
Sign-in risk detection
10
Dimensionality of risk
11
Geocloaking
12
Dynamic 2FA: Ask for additional verification
13
Choose the challenge that minimizes damage
14
Secondary e-mail verification
15
SMS code
16
Google Prompt
17
Hijacking monetization
18
Bringing the user into the loop
19
Finding the hijacker in-session
Description:
Explore the anatomy of account takeovers in this 17-minute conference talk from USENIX Enigma 2018. Delve into the ecosystem supporting credential theft, the dangers posed to users, and the importance of automatic, defense-in-depth risk detection systems. Learn about the likelihood of users falling victim to data breaches, phishing, or malware, and how hijackers exploit stolen credentials. Examine how identity providers can use risk analysis and login challenges to enhance security for password-only users. Discover the practical weaknesses of certain login challenges and the evolving tactics of attackers. Gain insights into ongoing challenges, including the disconnect between public opinion and necessary security measures, and discuss potential industry solutions to improve overall account security.

Anatomy of Account Takeover - Understanding Threats and Defenses

USENIX Enigma Conference
Add to list