Account Defender protects your online resources from two types of threats.

Account Takeover

An attacker uses credentials (or a stolen token/cookie) to log into a legitimate user’s account.
After logging in, the attacker will try to take control over the account permanently by changing some of the account settings.
Once the attacker has control, they will conduct fraudulent actions.
The flow of actions will likely be as follows:

  1. Login
  2. Change account email
  3. Change account password
  4. Change home address
  5. Disable Multi-Factor Authentication (MFA) or notifications
  6. Perform a fraudulent action (e.g., withdraw funds, purchase items, transfer credits, send spam)
  7. Repeat fraudulent action until the account has no more value

Fake Account Creation

An attacker creates multiple accounts in order to abuse some part of the system.
For every new account, the attacker will perform fraudulent actions to maximize the stolen value.
For example, the attacker may:

  • Download paid content
  • Redeem new user voucher (or free time period)
  • Send spam
  • Post fraudulent action, the account will usually be abandoned