How to Stop ATO Attacks in Online Gaming

Alex McConnell
Alex McConnell
17/04/20
4 Minute read
How to Stop ATO Attacks in Online Gaming

Article Contents

    Account takeover (ATO) attacks occur when a cyber attacker obtains personal information – namely usernames, passwords and email addresses – with the intent to illegally log in to a target account.

    As the gaming industry continues to shift online, gaming account takeover (ATO) attacks are becoming an increasingly common – and costly – problem, as well as one of the clearest examples of how bots are ruining online gaming for players and publishers. Once the attacker has successfully accessed the account, they can carry out a range of malicious activities for their own gain.

    Given the devastation that can unfold following an attack, it is vital that gaming organizations recognize the importance of customer password security and the relevance of their bot management solution indirectly responding to the ATO threat. Understanding the impact of ATO attacks can limit the scope for customers falling victim to fraudulent activity while preventing significant financial and reputational damage to the organization.

    What is ATO attacks in gaming?

    Account takeover (ATO) is a common form of cybersecurity attack which sees cybercriminals using stolen passwords and usernames to take control of the accounts of legitimate users. ATO attacks have become increasingly common within the gaming world, where users often have bank or card details linked to their accounts or might have deposited funds that can then be withdrawn by the hacker. Hackers might even be able to leverage stolen account information to access other accounts belonging to their victim.

    How do attackers steal your credentials for gaming ATO?

    Over the last two decades, society’s digital shift and it’s unremitting advancements have resulted in vast amounts of accumulated personal data and an increasing number of points of entry for cyber attackers to exploit and access that data.

    So, where does all this data end up? The majority of the personally identifiable information acquired finds its way to the dark web, home to numerous lists of compiled credentials from years of data breaches carried out across all industries and all websites.

    That being said, an ATO attack does not rely on access to highly sensitive user information for it to be successful. An attack can be instigated using scraps of information compiled with just a little bit of research to acquire a full name, an email address or date of birth. Most of this information is provided willingly by users on their social media accounts. A cyber attacker will simply search and locate the pieces of identifiable information (i.e name, email address), most of which can be found with minimal effort, and the takeover attempt can be constructed from there. Additionally, the average user age within online gaming is significantly lower than other gaming sub-verticals, heightening the risk of simplistic and recycled passwords across multiple accounts. When the more sensitive pieces of account information are easily deciphered, it opens the entire industry up to attack through an easily targetable consumer circle.

    Why aren’t ATO attacks detected and stopped?

    ATO attacks that are carried out using credential stuffing typically utilize automated bots to gain brute-force entry into an account. Organizations with web-facing operations are savvy to automated threats and typically have some form of detection and mitigation software in place on their login pages, to identify real users from automated bots that are linked to ATO activity. Yet, every week there is a new breach or leak of private information from a recognizable company; so why are businesses that seem to have relevant security measures in place still experiencing ATO attacks?

    In recent talks with one of the UK’s largest online sportsbooks, the organization deduced their current security solution mitigates almost all ATO attacks, with an estimated ATO success rate of 0.03%; this is below the global average of 1-3%. While this is a low success rate, there are successful account takeovers nonetheless, and once an account has been breached it opens doors to further sinister activity.

    The question as to why the aforementioned sportsbook had a smaller success rate percentage than average, can further be explained by the evolving sophistication of ATOs and their ability to evade secure solutions previously designed to identify and mitigate them.

    It is not uncommon for malicious actors to hide ATO attacks behind surges of automated traffic, enabling the activity to remain undetected by many front-end solutions. Other fake user accounts are created and then logged in to successfully. Cyber attackers can manually or automatically carry out a small number of login attempts, using combinations of the information scraps gathered round the account, which if unsuccessful, can be followed up with another successful login using another fake account. This process can be repeated, hiding the malicious intent in a sea of positive-looking traffic until the successful combination is found.

    What impact do ATO attacks have on users and businesses?

    The detrimental effects of an ATO attack go far beyond the financial costs of restoring account value and administrative time spent resetting passwords. Users will become increasingly frustrated and will lose trust in the organization, with research by the Ponemon Institute revealing that nearly a third of consumers sought to terminate their relationship with a company following a data breach. In addition, damage to a business’ reputation is likely to diminish numbers of new users creating accounts in the future.

    All of which affects a company’s bottom line. When there are fewer returning users spending money on your platform, and a decreasing number of new users joining and spending money, annual profit margins quickly take a hit.

    Fake account creation associated with ATO can also leave your business vulnerable to other forms of sophisticated bot attacks, such as credential stuffing.

    How can I avoid and combat gaming account takeover attacks (ATO)?

    Due to the growing trend of sophisticated automated bot attacks Forrester, an expert analyst firm in the field of cybersecurity, highlights the importance of having a bot management strategy in place and predicts it will become the predominant form of application defense in the next 18 months.

    Incorporating a specialist bot management tool that determines the intent of all web-facing traffic, enables gaming organizations to identify and prevent attacks. Tackling the evolving bot threats requires expertise beyond bolt-on bot management solutions, to effectively mitigate attempts to bypass traditional security measures such as WAFs and CDN bolt-ons.

    Is your online gaming platform faced with an increasing amount of sophisticated automated bot attacks? Talk to the bot management experts at Netacea today to find out how we can help you stop gaming account takeover from occurring and how to mitigate threatening malicious bots.

    Block Bots Effortlessly with Netacea

    Book a demo and see how Netacea autonomously prevents sophisticated automated attacks.
    Book

    Related Blogs

    Knight chess piece
    Blog
    Alex McConnell
    |
    04/06/24

    What is a Sophisticated Bot Attack?

    Learn about the growing sophistication of bot attacks. Find out how to improve defenses and detect these attacks effectively.
    Robot
    Blog
    Alex McConnell
    |
    28/05/24

    Offensive AI Lowers the Barrier of Entry for Bot Attackers

    Explore the impact of offensive AI and automated attacks. Discover how AI is changing the landscape of cybersecurity.
    Worker helmet
    Blog
    Alex McConnell
    |
    22/05/24

    What is Defensive AI and Why is it Essential in Bot Protection?

    Discover the potential of defensive AI in bot protection. Explore how machine learning can protect against automated attacks.

    Block Bots Effortlessly with Netacea

    Demo Netacea and see how our bot protection software autonomously prevents the most sophisticated and dynamic automated attacks across websites, apps and APIs.
    • Agentless, self managing spots up to 33x more threats
    • Automated, trusted defensive AI. Real-time detection and response
    • Invisible to attackers. Operates at the edge, deters persistent threats
    Book a Demo

    Address(Required)