At this very moment, there are at least 16 billion recently stolen login credentials available to hackers in various dark corners of the internet. That is, according to the Cybernews researchers who uncovered the massive breach, “a blueprint for mass exploitation…. account takeover, identity theft, and highly targeted phishing.”
While account takeover (ATO) attacks can target both individuals and corporations, the methods, motives, and impacts often differ. ATO attacks on individuals are primarily motivated by financial gain through direct exploitation. With corporations, motives are more strategic, with the potential for scalable exploitation, such as data or intellectual property theft, ransomware deployment, reputational harm, or full systemic compromise through an admin or executive account.
According to Abnormal Security’s 2024 State of Cloud Account Takeovers Report, over 75% of security leaders consider ATOs to be among the top four global cyber threats to their organizations. That’s not surprising, as account takeovers have increased by nearly 100% since 2019, with attacks rising 24% between 2023 and 2024 alone (Sift’s Q3 2024 Digital Trust Index). In large part, this is a result of the widespread availability of stolen credentials on the dark web, as noted, more extensive data breaches, and easy access to password-cracking tools. Therefore, the typical hacker “business model” in this field is to gain access to username and password databases wherever they can and then sell the data to someone else.
The problem is that securing your own database of credentials may not be enough to prevent a successful ATO. With over 70% of people using the same credentials for multiple accounts across their online interactions, a data breach at another company can immediately put your systems at risk of account takeover as well. Even if just a small percentage of the compromised usernames are found in your organization, that could be all that’s needed to gain access.
For example, in the spring of 2024, millions of customer records with login credentials and personally identifiable information (PII) were stolen by hackers from the cloud-based data platform provider, Snowflake. They then offered that data for sale on the dark web, which led to ATO attacks and widespread ransom demands, as well as class-action lawsuits, increased regulatory scrutiny, reputational harm, and reconsideration of cybersecurity measures.
Attackers can attempt ATOs in a variety of ways, the most popular of which is password cracking (other options include targeting session tokens, exploiting technical weak points, and social engineering, which we won’t touch on in this blog).
The most common technique for password cracking is credential stuffing, when stolen username-password pairs from one site or service are used to attempt to access another. The cyber security industry’s working assumption is that a minimum of 0.01% of any site’s credentialing database can be used to successfully access another site or service. So, for example, a database of one million users from a single site could enable a takeover of 100 accounts in a similarly sized community of users elsewhere.
SpyCloud’s 2025 Identity Exposure Report confirmed a 70% password reuse rate for users exposed on the dark net in two or more breaches in the last year, while Security.org reported this year that 32% of ATO victims had other accounts with the same password taken over as well. For security personnel, this is a frustrating reality as the initial credential breach takes place in a service that is not under their control and the subsequent attacks are relatively easy to perpetrate.
A rapid series of requests intended to discover whether specific email addresses exist within a system is called email enumeration. It can be the first step in credential stuffing or a standalone effort if the attacker doesn’t have access to paired passwords.
Once the attacker identifies one or more usernames on the target site, they can initiate password spraying – rapidly trying a series of easy, common or default passwords (like “123456” or “Password1”) to access the account. When carried out across multiple accounts at a target organization, this tactic can often evade lockouts triggered by too many login attempts.
A brute-force version of password spraying is the dictionary attack, in which attackers simply cycle through a list of possible passwords. This ATO tactic is becoming less and less effective with the increasing sophistication of password security.
Hackers typically use tools like Playwright and Selenium to automate login attempts, as well as botnets and proxies to perform brute-force, password-spraying or credential stuffing attacks at scale. With intelligent bot automation, attackers can rapidly test different credential combinations on multiple sites, often mimicking expected human login behaviors to bypass bot detectors.
A key metric to consider when evaluating the risks arising from an ATO attack – and therefore how to prioritize your defenses – is its conversion ratio; i.e., the percentage of attempted intrusions that result in successful account compromises. For credential stuffing, this rate can be increased if the target site or service is related in some way to the site from which the credentials were stolen. Other factors include credential quality, with recent breaches tending to yield higher success rates, and the use of sophisticated bots designed to bypass basic protections. Smart hackers can use very recent, highly correlated lists to reach up to 10% of users registering at least an initial hit and higher conversion ratios.
With that in mind, the most effective mitigation technique by far is multifactor authentication (MFA), especially when it is a default account access setting. Hackers are unlikely to have access to the second factor device or application; however, it is imperative that the same credentials not be reused to access the second factor system. Notably, the Snowflake breach was possible only because an initially compromised account did not have optional MFA enabled.
Some companies cannot realistically mandate MFA across their entire userbase due to business considerations. And the percentage of people choosing MFA when it is voluntary is often very low. Many financial institutions have addressed this issue by only requiring secondary authentication (like entering a code sent via SMS) when a user wants to carry out actions such as withdrawing or transferring funds. However, this can still leave some critical information (PII and PCI) vulnerable to exploitation by successful ATO hackers.
Additional measures that can be taken to protect your business and your customers from ATO attacks include a sound access management policy:
ATO attempts using password cracking may initially be misidentified as a DDoS attack, due to the spike in traffic they entail. Smart hackers, however, will be careful to avoid the “DDoS effect” (i.e., causing a service to freeze up or crash due to a pipeline bottleneck). Several automated mitigation measures have therefore been developed to successfully identify and halt an ATO attack based on the pattern of attempted logins.
In addition to the mitigation measures you can take independently, cybersecurity and web infrastructure vendors like Cloudflare, Imperva, and Radware have rolled out advanced features to combat ATO attacks.
The new ATO mitigation features reflect a shift among major vendors from static defense to adaptive, intelligence-driven protection. This pivot alone, regardless of the effectiveness of each specific tactic, is a noteworthy change that can improve cybersecurity.
ATO testing assesses the resilience of account services against unauthorized access attempts. By identifying strengths and vulnerabilities, you can proactively reduce the risk of data breaches and enhance user trust.
Red Button’s methodology for ATO testing is to simulate the conditions and capabilities of likely external attackers. This means black-box testing, with minimal or no prior knowledge of the target system. We rely on publicly accessible information and thorough reconnaissance of the service, just as a hacker might do, in order to attempt bypassing existing ATO protections and to prepare for any contingencies.
We use a globally distributed botnet and a massive database of publicly available compromised credentials to simulate various ATO attack scenarios. This high-volume automation provides insight into your exposure and evaluates how well your system can withstand real-world ATO attempts.
Analysis of your login flow and ATO simulation testing uncovers hidden vulnerabilities, such as client-side JavaScript, encrypted cookies, and other under-the-hood mechanisms. A detailed report outlines what we found and provides clear, prioritized recommendations for remediation.
Even before undertaking ATO testing or implementing preemptive measures, we strongly recommend the following preliminary steps to immediately lower your risk and improve your mitigation capabilities.