How to prevent account takeover fraud — what controls are actually working?
Join the DiscussionNo Reliance on Forum Content. The information, opinions, and discussions shared on this forum are contributed by community members and LexFlag Team and do not constitute professional advice. LexFlag does not endorse, verify, or guarantee the accuracy, completeness, or reliability of any content posted.
User Identity & AI-Generated Content. There is no guarantee that users are using their real names, represent any organization, or express their own personal views. Replies and contributions may be partially or fully generated by artificial intelligence.
Independent Verification Required. You must independently verify any information obtained from this forum before making any decisions. LexFlag, its affiliates, and contributors accept no liability for any loss or damage arising from reliance on forum content.
Account takeover fraud is our #1 fraud category by losses this year. Phishing, credential stuffing, SIM swaps — all of it. We've implemented MFA but fraudsters are getting past it with social engineering (calling customers and tricking them into approving push notifications).
Looking for practical input on prevention beyond the basics. Specifically:
- Are behavioral biometrics actually delivering on the promise?
- How are you handling the MFA bypass problem?
- Is device binding/recognition making a meaningful difference?
Our prevention budget just got approved so I have some room to invest but want to spend wisely.
Behavioral biometrics helped us but with caveats. The typing/swiping pattern analysis catches some ATO but the real value was in detecting session hijacking — where a legitimate login is taken over mid-session by a different person. That's a scenario where traditional MFA does nothing because the session is already authenticated.
For the MFA bypass problem specifically, we moved to phishing-resistant MFA (FIDO2/WebAuthn) for high-risk actions like wire transfers and contact info changes. It's a significant UX change so we rolled it out gradually. Hardware keys aren't realistic for all customers but for high-value accounts it's been very effective.
Device recognition is probably the highest ROI single control. If a login comes from a device we've never seen before + a new IP + an unusual time, we force step-up authentication regardless of whether the password was correct.
2 replies
To build on Rachel's point — a layered approach works best:
Prevention layer: Strong authentication, device binding, credential monitoring (are your customers' passwords in breach databases?)
Detection layer: Behavioral analytics, impossible travel detection, velocity checks on sensitive account changes
Response layer: Automated account lockout triggers, customer notification workflows, rapid recovery processes
The mistake we see most often is over-investing in prevention and under-investing in detection and response. You will never stop every unauthorized access attempt. The question is how quickly you detect it and how much damage occurs before you do.
Also — don't underestimate the value of friction at the right moments. A 30-second cooldown before processing a contact info change followed by a wire transfer has virtually zero impact on legitimate customers but destroys the economics of automated ATO attacks.
Log in to reply
More Discussions in Fraud Prevention
Mobile check deposits and synthetic identity fraud — overlapping risk?
Rise of authorized push payment (APP) fraud — what controls are working?
Synthetic identity fraud prevention in community banks — realistic options?
Browse Other Categories
Need Help?
Our support team is here to assist you with any questions
In-App Messages
Registered users can contact support directly through the messaging system.
Login to Message Register