chat
expand_more

Cross-Platform Account Takeover: 4 Real-World Scenarios

Cross-platform account takeover is an attack where one compromised account is used to access other accounts. Learn about four real-world examples: compromised email passwords, hijacked GitHub accounts, stolen AWS credentials, and leaked Slack logins.
July 22, 2024

Account takeover (ATO) is a well-known attack method that has been documented for years. However, a less common type of attack occurs when ATO is used as the initial attack vector to gain access to another account, this is known as cross-platform ATO. In this article, we’ll showcase four scenarios where cross-platform ATOs can occur, taken from discussions on cybercrime forums and networks.

1. Compromised Email Credentials

Email accounts often contain (or can provide) a trove of sensitive information, such as password reset links, two-factor authentication codes, and financial records. If an attacker gains access to your email, they can impersonate you, reset passwords on your other online accounts, and intercept security notifications—enabling them to compromise nearly any other owned account.

On a cybercrime forum, a user demonstrated how they gained access to an email account through a business email compromise (BEC) attack, which typically involves social engineering tactics like phishing or spear-phishing. They later discovered that the account was connected to a bank that had received over $61 million to date. This is a prime example of cross-platform ATO.

Cross Platform ATO 1

By compromising the email account, they were able to access the connected bank account. We can assume that anyone buying this access would then use it to infiltrate the bank and steal the money—likely using the email account to reset the password and/or as a way to intercept MFA codes. Implementing stronger security measures that can immediately detect compromised email accounts, in addition to using hardware security keys and time-based one-time passwords, can significantly reduce cross-platform ATOs that originate from email.

2. Hijacked GitHub Accounts

GitHub is an increasingly attractive target for attackers because it often contains business-sensitive information, like private corporate repositories, API keys, and insights into your overall technology stack.

If you take a look below, you will see that an attacker offered to sell access to GitHub accounts and their associated API keys, claiming that cloud infrastructure was within their reach. If a user purchases access to a GitHub account, there is indeed a high likelihood that the repositories could contain secrets, API keys, or even SSH keys that could be used to compromise infrastructure used by the organization.

Cross Platform ATO 2

From GitHub, the attacker can pivot in several ways to perform a cross-platform ATO. They can access private code repositories to exfiltrate intellectual property and sensitive data, which may include credentials for other accounts or services. Alternatively, they could launch further attacks by modifying source code, potentially affecting downstream applications or services that rely on the compromised GitHub repository.

3. Compromised AWS Credentials

Cloud infrastructure like Amazon Web Services (AWS) has become an important component of business operations, making cloud credentials a prime target for attackers looking to gain access into an organization. With AWS access, an attacker can spin up new resources, access sensitive data stored in S3 buckets or RDS databases, and even pivot to other connected services.

Looking at the screenshot below, a user offered corporate AWS access, with some accounts spending as much as $50,000 per month on infrastructure and operations. They stated that it's possible to ransom a company if the customer possesses the knowledge to navigate AWS; unfortunately, this is completely accurate.

Cross Platform ATO 3

It’s also important to note that users frequently share information on how to escalate privileges from compromised AWS accounts, going from simple AWS compromise to EC2 server access, S3 bucket access, and more.

Cross Platform ATO 4

If you take a look above you will find an example of text on a cybercrime forum where a rather detailed process is shared that explains how to go from basic AWS access to complete infrastructure takeover.

4. Stolen Slack Credentials

Slack has become a ubiquitous communication and collaboration tool for many organizations, and attackers recognize the value of compromising Slack accounts, as they can provide a gateway to sensitive corporate data and connections to other systems. In fact, this is exactly how EA Sports was compromised a few years—ultimately resulting in key sections of FIFA 2021 being released to the public.

Cross Platform ATO 5

In a thread on a cybercrime forum, one user claimed to have compromised a Slack account and compiled contact information for HR and finance teams, as well as received access to all company documents.

Although they were seeking assistance in monetizing this access, the reality is that they could easily use that insider knowledge to conduct cross-platform account takeover to another valuable application. They could social engineer a victim on Slack using techniques like pretexting or baiting or use insider knowledge obtained from chat logs and documents to create highly targeted phishing emails to other employees and gain access to their accounts.

Additionally, if the compromised account had Slack app integrations with appropriate permissions, the attacker could potentially gain access to other connected services, such as GitHub repositories, Jira tickets, or Google Drive documents.

Cross-Platform Account Takeover Protection

Don't let a single compromised account be the gateway to a devastating breach. Take action now to protect your organization from cross-platform ATO attacks.

Abnormal's Cloud Account Takeover solution is your first line of defense against these threats. Our advanced AI-native platform seamlessly integrates with the cloud and SaaS applications your organization uses daily, offering centralized visibility and control over user activities, roles, and permissions. By building a behavioral baseline for each user, Abnormal's AI continuously monitors authentication events and notable activities, detecting anomalies that indicate potential account takeovers.

When suspicious activities are detected, Abnormal quickly secures compromised accounts by blocking access, resetting passwords, and logging out active sessions. This rapid response significantly reduces remediation time and transforms the way security teams protect cloud identities.

Interested in learning more about how Abnormal protects your organization from cross-platform account takeovers? Schedule a demo today!

Schedule a Demo
Cross-Platform Account Takeover: 4 Real-World Scenarios

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Proofpoint Customer Story Blog 9
Discover how Abnormal's AI reduced this Fortune 500 automotive retailer and transportation services provider's risk, detecting 5,699 attacks Proofpoint missed and saving 105 SOC hours monthly.
Read More
B Top10 Blogs
Discover the top cybersecurity insights from 2024 with Abnormal's most-read blogs. From AI-driven threats to evolving defense strategies, explore trends, challenges, and solutions that are shaping the future of cybersecurity.
Read More
B Proofpoint Customer Story Blog 8
A Fortune 500 transportation and logistics leader blocked more than 6,700 attacks missed by Proofpoint and reclaimed 350 SOC hours per month by adding Abnormal to its security stack.
Read More
B Gartner MQ 2024 Announcement Blog
Abnormal Security was named a Leader in the 2024 Gartner Magic Quadrant for Email Security Platforms and positioned furthest for Completeness of Vision.
Read More
B Gift Card Scams Tricker to Spot Blog
Learn why gift card scams are becoming more difficult to identify, how cybercriminals evolve their tactics, and strategies to protect your organization.
Read More
B Offensive AI 12 16 24
Learn how AI is used in cybersecurity, what defensive AI vs. offensive AI means, and how to use defensive AI to combat offensive AI.
Read More