Why bother to spend time hacking when you can come in through the front door? Account take over is still one of the most common attack vectors for a good reason. Gaining access to customer accounts via the login is one of the simplest way of achieving a data breach. Attackers are increasingly using sophisticated AI bots to defeat login passwords, CAPTCHA's and even MFA.
Site Cloning
Bots can be used to quickly steal the digital assets from websites and produce cloned sites that look identical to the original target. An army of bots crawls over the site, lifting the content, images and HTML elements, and the entire site is lifted and shifted across by the hackers. These sites are hosted with a very similar URL so that many users won't notice the URL change. Only the login pages need to be functional. Once the victim logs into the fake site with their real credentials, bots log-into the real site, and its game over.
MFA Breaches
Many people ignore the constant attempt to login using password and email combinations in brute force attacks. They know these will fail, as they can't crack the two-factor authentication. However, sophisticated cloning which exactly clones the current login password / combo / Multi-factor authentication fools the victim into logging into the fake site with real credentials. The bots will then login into the target site, triggering an authentic MFA - which the victim is expecting. Then they enter the 2FA code into the wrong site, and again the bot then logs into the target site with the real MFA. Now that most high security login's are moving away from insecure SMS based OTP which are easily hacked, the use of authenticators makes the MFA breach more difficult, but the cloning method still works reliably to bypass these defences.
How does VerifiedThreat prevent this?
Our Agentic AI bots assess the vulnerability of the entire site across multiple threat vectors? Can bots access the site unchallenged and steal IP, content and digital assets? How secure is the login path? What is the protection for brute force attacks? Can the login path detect non human logins and prevent them? What are the WAF limits and how can they be bypassed.
Book your online demo!
To ensure your site is protected, book your online demo and see if your site is vulnerable.