Account takeover (ATO) remains one of the most pervasive threats in the modern cybersecurity landscape. Since 2019 there has been a 100% increase in reported account takeovers, primarily due to the growing availability of stolen credentials and password-cracking tools on the dark web.
For attackers attempting ATOs, Command-Line Interface (CLI) tools have been the weapon of choice as they are fast, scriptable, easy to automate, and available for most systems. However, as authentication systems become more sophisticated, attackers are shifting tactics — moving away from CLI tools in favor of browser automation frameworks. In this post, we explore why (hint: they better mimic real-user behavior), which tools are in use today, and how organizations can defend themselves effectively.
In ATO scenarios, CLI‑based automation is typically used for username enumeration, credential stuffing, password spraying, and other types of authentication probing. The targets tend to be APIs, password‑reset endpoints, and other rate‑limited services.
But today’s logins are not the simple, static HTML forms of the past. Modern authentication pages often include security measures such as client-side logic (JavaScript and cookies validation, dynamic field changes), multi-step flows (email confirmation, SMS code, authentication apps), human‑verification challenges, device fingerprinting, browser integrity checks, and WAF and anti-bot protections.
Those features make traditional CLI attack tools, like Hydra, less effective because they operate outside the browser. They send basic HTTP requests and cannot interact with dynamic content, such as JavaScript and cookies. CLI tools lack stateful session handling, while modern authentication flows often rely on client‑side tokens (like JWT) bound to a session and created through a browser. And anti-bot measures like CAPTCHAs and browser integrity checks are essentially instant roadblocks in CLI-level ATO attempts.
In addition to the aforementioned limitations, CLI tools tend to leave trace patterns that are easier for security systems defenders to detect because they’re repetitive and structured, lacking the “messiness” of real browsing. Browser automation frameworks, on the other hand, are specifically designed to simulate actual browser activity and user behavior.
Browser automation tools mimic human interaction with websites, including page loads, timing variation, navigation of conditional login flows, and bypassing basic user challenges. They complete the illusion by handling dynamic client-side content such as JavaScript execution, cookies, and session management. Attackers will therefore typically turn to browser automation tools for ATO attempts targeting sites with strong bot detection, multi‑step logins, CAPTCHA‑protected pages, JavaScript‑rendered login forms, and the like.
There are several browser automation tools currently available to hackers intent on attempting ATOs at scale, each with its own advantages and disadvantages.
We increasingly see these tools and techniques in the wild. Attackers rely on automated browsers to execute password‑cracking ATO attempts, layering on additional capabilities to evade detection. These often include outsourced or AI‑driven CAPTCHA solving, aggressive proxy rotation using residential IP networks, frequent user‑agent changes, and randomized interaction timings. Browser automation frameworks make all of this trivial to orchestrate, with many other techniques enabled by these platforms.
Generally, defending against scripts that mimic real browsers is much harder than defending against CLI tools. But there are layered strategies that can significantly reduce the effectiveness of these attacks.
Finally, consider your entire login architecture. How are authentication, authorization and secure access managed across your system? Is it consistent everywhere users can log in or are there some unsecured “back doors”?
Attackers have evolved from simple CLI password crackers to sophisticated browser automation frameworks that closely mimic human behavior. Selenium, Playwright and Puppeteer, developed as tools for dev and QA, have become accessible, powerful components in an attacker’s toolkit. They allow ATO attempts to bypass basic challenges, execute on the browser level, and blend into normal traffic patterns in ways that older hacker tools never could.
Defending against this shift requires organizations to modernize their controls and adopt a layered approach. Strong authentication policies and MFA form the foundation, reinforced with hardened WAF rate‑limit rules, robust bot‑detection signals, behavioral analysis and continuous monitoring for suspicious patterns. When these defenses work together, they raise the cost of automation, reduce the success rate of credential‑based attacks, and help organizations stay ahead of the growing risk posed by automation‑driven ATO campaigns.