Sign up for Fraud Alerts
Stay on top of credit and debit card fraud by opting into our SMS messages for fraud alerts.
LOGIN TO ENROLLDCU Routing Number: 211391825
No Recent Searches Found
Did you mean:
Sorry, We couldn't find what you are looking for. It could be because of many reasons.
Account takeover (ATO) fraud is spreading, in part, because the cybercriminals who launch these attacks don’t have to be particularly sophisticated to find success. They just need to be relentless. This is because they require only a few pieces of identifiable information in order to gain access to targeted accounts, and they leverage illegal, automated tools to help them do just that.
To successfully avoid account takeover fraud, it helps to understand what exactly ATO fraud is and what some common examples are to help identify it. Once you know what to avoid, it will become easier to keep your accounts and data safe.
Read about some of the most common account takeover fraud scenarios and examples below.
Please note, membership is required to open a DCU Checking Account. Visit our membership eligibility page for more information.
A specific type of identity theft, account takeover fraud occurs when cybercriminals steal one or more of the following:
The ultimate goal for these fraudsters is to infiltrate banking, credit card, email, and social media accounts. Typically, the information used in ATO attacks against individuals comes from previous data breaches and other vulnerabilities criminals have exploited.
Account takeover fraud is unique in that attacks are centered around fraudsters stealing access to and leveraging their victim’s already-existing accounts versus stealing an identity to take out a line of credit. However, they are both illegal and can cause serious damage to consumers and businesses. To put it in perspective, ATO attacks and other types of identity theft crimes made up nearly 36 percent of the United States’ 5.3 million fraud reports filed with the Federal Trade Commission (FTC) in 2022.
Banks and credit unions are often targeted by platforms called CaaS, otherwise known as cybercrime-as-a-service. These commercial solutions, often developed and sold on the dark web, are powerful and sophisticated, making it easy for fraudsters to overwhelm many IT professionals. DCU takes cybersecurity seriously. From sophisticated transaction monitoring solutions to behavioral analysis, our experts work tirelessly to protect members from cybercriminals. However, the best protection against ATO fraud is consumers knowing what to be on the lookout for, which we’ll dig into below.
Explore the following scenarios to learn how you can identify account takeover fraud.
Fraudsters often target victims using sophisticated social engineering tactics, including forms of impersonation where the criminal pretends to be someone you can trust, such as a representative from your bank, local government office, or popular retailer. The criminal will then attempt to create urgency by presenting a set of dire circumstances that the targeted individual needs to address immediately in order to avoid consequences.
Phishing emails are widely used because they’re often successful. They offer recipients a false sense of security and they are more difficult for anti-phishing solutions to identify since the communications come from accounts that would normally be legitimate. Other phishing emails–ones that don’t come from legitimate accounts–are easier to identify, but there are still best practices to follow. These emails may include:
You should never open a communication from a source that seems suspicious or is unknown to you. If you think you’re being phished:
Malware is malicious software designed to infect computers and networks, targeting system vulnerabilities for the purpose of data theft or damaging networks. Spyware is a specific type of malware that’s used for ATO attacks, as these programs are designed to gather personal data that is then sent to third parties without you ever knowing it. Keyloggers, a type of spyware, are especially dangerous. Keyloggers record every keystroke a user makes on their device, making it easy to steal passwords and other personal information.
An example of a successful account takeover fraud attack from malware is if you are sent a fraudulent email or text with a link you choose to click on that downloads a keylogger onto your device without you realizing it.
A variety of reputable anti-virus programs and firewall solutions are available to help prevent and remove malware from your devices. Many are available from reputable software providers and device manufacturers, and some require an active subscription.
Other best practices include:
SIM-swapping is when cybercriminals hijack control of a mobile device. With a SIM-swap, fraudsters take control of a device by convincing a phone carrier representative to transfer control of the number to a SIM card that’s controlled by them. Once they have that capability, they can leverage the device to help take control of accounts belonging to their victims.
SIM-swapping is a newer type of ATO attack that’s been dangerous, successfully targeting even the highest levels of government agencies. In January 2024, the Securities and Exchange Commission (SEC) had its account for X, formerly known as Twitter, hacked. At the time, the agency had its MFA functionality turned off for platform use, which helped aid the criminal party. Since regaining control of the social media account, MFA authentication has been turned back on.
Regular monitoring of your accounts could make all the difference between successfully stopping an ATO attack before any damage is done and facing serious consequences. Should you face a breach, do the following:
DCU members impacted should call 800.328.8797 so affected accounts and/or cards can be turned off, to prevent future losses, and for replacement cards. In addition, place a fraud alert with one of the credit reporting agencies:
Contacting each of the three isn’t required, as the one you call will report fraud to the other two credit monitoring companies.
To secure accounts, DCU member numbers are encrypted but never shared or visible to outside parties. Mobile data is also protected using the highest level of security. In addition to our security measures, being vigilant and following the best practices outlined above will help prevent falling victim to a successful ATO attack.
A not-for-profit credit union catered to its members, DCU is dedicated to sharing education and the latest findings on financial literacy and fraud prevention. Learn about becoming a member.
This article is for informational purposes only. It is not intended to serve as legal, financial, investment or tax advice or indicate that a specific DCU product or service is right for you. For specific advice about your unique circumstances, you may wish to consult a financial professional.
Federally insured by NCUA.