• About
  • Library
  • News
  • FAQ
  • Sign In
  • Sign Up
  • Donate
  • Media Credits
    Sign in Sign up
    • About
    • Library
    • News
    • FAQ
    • Sign In
    • Sign Up
    • Donate
    • Media Credits
    Home » Library » Behaviours » Account Takeover
    • Home
    • Library
    • Behaviours

    Account Takeover

    From the IFTAS Trust & Safety Library - supporting volunteer moderators in the Fediverse

    Table of Contents
    • Definition
    • Identifying Account Takeovers
    • Challenges
    • Discussion

    Definition #

    Where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

    Identifying Account Takeovers #

    An account owner may use out-of-band communications like email to report the loss of an account.

    Followers of the account may report the account for unexpected changes in account details or posting habits. Alternatively, the account may exhibit unlikely increases in reposts or likes or boosts.

    Login may occur from new or unlikely geographic locations. This can be ascertained with some level of certainty from account IP address usage.

    Challenges #

    A large number of services allow account creation with nothing more than a nickname and an email address, making it hard to verify the true account holder. One method of account takeover is to email the support option and falsely claim that the account has been taken over, and request it be reset using a new email address belonging to the attacker.

    It is important to verify any incoming requests.

    • Is the request from the email address associated with the account?
    • If not, can the requestor name the email address that was previously used, and explain why they no longer have access to that email?
    • Can the requestor tell you their current IP address? Does it roughly match any of the IP addresses you may be able to see the account has used previously?
    • Has the user had previous interactions with your support team? Can those be described?

    Discussion #

    Discuss this label in the Account Takeover forum.

    This page was last updated on 2024-03-30
    Was this page helpful?
    Astroturfing

    IFTAS Community Library is licensed under CC BY-NC-SA 4.0, unless otherwise noted. 

    IFTAS Moderator Library

    Guides & HowTos

    Wellness & Resilience

    Legal & Regulatory

    Actors

    Behaviours

    Content

    Tools & Resources

    Community Management

    IFTAS Documentation

    Independent Federated Trust & Safety
    • Terms of Service
    • Privacy Policy
    • Contact Us
    • Donate

    © 2025 IFTAS

    Report

    There was a problem reporting this post.

    Unauthorized control of a user account.
    Disclosing someone’s personal, non-public information without the person’s consent.
    Content describing or depicting things of an intimate, offensive, graphic, or violent nature.
    False information that is spread unintentionally which may nonetheless mislead or increase likelihood of harm to persons.
    Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress.
    Fraudulent sending of messages purporting to be from reputable sources in order to induce individuals to reveal personal information.
    Use of the network in a way that violates the terms of service, community guidelines, or other rules.
    Unsolicited, low-quality communications.
    Intentional provocation of hostility or confusion.

    Block Member?

    Please confirm you want to block this member.

    You will no longer be able to:

    • See blocked member's posts
    • Mention this member in posts
    • Invite this member to groups
    • Message this member
    • Add this member as a connection

    Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.

    Report

    You have already reported this .