Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know About
  • The Hacker News

Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know About

[email protected] The Hacker News Published: April 30, 2025 | Updated: April 30, 2025 4 min read
0 views
Customer Account Takeovers

Everyone has cybersecurity stories involving family members. Here’s a relatively common one. The conversation usually goes something like this:

“The strangest thing happened to my streaming account. I got locked out of my account, so I had to change my password. When I logged back in, all my shows were gone. Everything was in Spanish and there were all these Spanish shows I’ve never seen before. Isn’t that weird?”

This is an example of an account takeover attack on a customer account. Typically what happens is that a streaming account is compromised, probably due to a weak and reused password, and access is resold as part of a common digital black market product, often advertised as something like “LIFETIME STREAMING SERVICE ACCOUNT – $4 USD.”

In the grand scheme of things, this is a relatively mild inconvenience for most customers. You can reset your credentials with a much stronger password, call your bank to issue a new credit card and be back to binge-watching The Crown in short order.

But what happens when similar incidents occur thousands of times daily across the world’s most popular web applications?

The Hidden Scale of Account Takeovers (ATO)

Flare’s recent report, The Account and Session Takeover Economy, reveals just how widespread and costly this issue has become. Industries like e-commerce, gaming, productivity SaaS, and streaming are particularly hard-hit, each seeing over 100,000 newly exposed accounts per month.

The report found a median account takeover exposure rate of 1.4% among platforms ranging from 5 million to 300 million users. Of particular concern is the rise in session hijacking—a technique that allows attackers to bypass multi-factor authentication (MFA) by stealing session cookies, often via infostealer malware.

Returning to the streaming example, it’s likely that the attacker didn’t even need to log in with a password. With an active session token in hand, they simply injected it into a browser using an anti-detect tool and gained full access—without triggering alerts or MFA challenges.

A major entertainment or e-commerce platform with millions of users—Netflix, Epic Games, or Wayfair—can conservatively expect thousands of customer accounts to be vulnerable to takeover at any given time.

Customer Account Takeovers
Average New Exposed Accounts (Monthly) – Scaled View from Flare’s The Account and Session Takeover Economy Report

What’s the Real Cost of an ATO

The economic toll of ATOs is difficult to fully quantify, but Flare’s report breaks it down into three major categories: labor, fraud, and customer churn.

Let’s revisit the streaming example from earlier. Some users may chalk the issue up to bad luck and stick around for the next season of Stranger Things. Others, however, may cancel out of frustration—especially when they’ve already had to reset passwords, deal with credit card issues, or simply feel their trust has been violated. A 2023 report from fraud prevention company Sift found that 73% of users believe the brand—not the user—is responsible for preventing ATOs.

We’ve used streaming as an example in this article because of their cultural significance in global entertainment, but we don’t make any assumptions about their security posture, breach history, or business practices.

To understand the potential business impact, consider a fictional entertainment streaming service. If there are 100 million paying customers at $120 per year…

  • If 0.5% of accounts are taken over—about one-third of the median exposure rate—that’s 500,000 affected users.
  • If even 20% of those users churn, the company stands to lose $12 million in annual revenue.
  • In a worst-case scenario where 73% walk away, the loss grows to $44 million.

This is all very rough “back of napkin” math but it provides a starting point for quantifying the financial risks associated with ATOs.

Remember, this is just a churn risk. Fraud-related losses are a separate discussion entirely! Now extrapolate this challenge across the hundreds of web applications that service millions of daily users.

Customer Account Takeovers
Cost of ATOs & Fraud Mechanism Per Industry

Recommendations for ATO Prevention

1. Monitor the Infostealer Ecosystem

While ransomware grabs headlines, infostealer malware is fueling the majority of credential-based attacks. Flare’s data shows a 26% year-over-year increase in exposures involving stolen credentials and session cookies.

According to Verizon’s 2025 Data Breach Investigations Report (DBIR), 88% of basic web app attacks involve stolen credentials, demonstrating how central infostealers are to modern account takeover operations.

2. Detect and Remediate Exposed Accounts

Organizations can dramatically reduce ATO risk by combining real-time infostealer intelligence with their identity and access management systems. This enables the detection and remediation of accounts that have been compromised—especially those with valid session cookies, which allow attackers to bypass authentication entirely.

Proactive monitoring and auto-remediation can prevent account abuse before it impacts customer experience or bottom-line metrics.

3. Communicate a Security-First Approach

Introducing friction—like forced password resets—can feel risky for customer experience. But most users expect companies to not only protect their data but also communicate any issues.

Also from Sift’s report- only 43% of ATO victims were notified by their company that their account had been compromised. Customers who experience this fraud but aren’t notified may feel like the company is not aware of account takeovers or have steps to help them out.

By clearly communicating the purpose behind these measures, organizations can reframe proactive security as a value-added feature. Transparency around ATO risks helps customers feel safer—and more loyal—over time.

About the Author: Nick Ascoli is the Director of Product Strategy at Flare and an experienced threat researcher who is recognized for his expertise in data leaks, reconnaissance, and detection engineering. Nick is an active member of the cybersecurity community contributing to open-source projects, regularly appearing on podcasts (Cyberwire, Simply Cyber, etc.) and speaking at conferences (GrrCON, B-Sides, DEFCON Villages, SANS, etc.)

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

What do you feel about this?

  • The Hacker News

Post navigation

Previous: Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks
Next: Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool

Author's Other Posts

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1

Related Stories

whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
hacked.jpg
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

[email protected] The Hacker News December 2, 2025 0 0
npm-mal.jpg
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

[email protected] The Hacker News December 2, 2025 0 1
iran-hacking.jpg
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

[email protected] The Hacker News December 2, 2025 0 0
SecAlerts.jpg
  • The Hacker News

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities

[email protected] The Hacker News December 2, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.