#16: Unconventional Tactics Fuel PayPal ATOs, Gmail AI Exploited for OTP, DoubleClickjacking Exploits
This week, we’re zeroing in on one of the most persistent and costly forms of fraud: account takeovers (ATO). With cybercriminals deploying increasingly sophisticated tactics – from hijacking PayPal accounts to exploiting Gmail’s AI features and DoubleClickjacking exploits – the stakes have never been higher. Let’s dive into the latest threats and how we can combat them.
NATE'S TAKE - JANUARY 14, 2025
Top Three This Week
- Unconventional Tactics Fuel PayPal Account Takeovers
- Gmail AI Exploited for One-Time Passwords
- DoubleClickjacking Exploits: A New Pathway for ATO
1. Unconventional Tactics Fuel PayPal Account Takeovers
Cybercriminals are deploying unconventional methods to compromise PayPal accounts, with many victims finding their accounts drained before they can react. These attacks often start with phishing campaigns that lure users into revealing login credentials. Once inside, fraudsters bypass additional security measures by exploiting weak recovery flows or simulating trusted device activity.
The financial impact is severe, as attackers move quickly to transfer funds or make unauthorized purchases. What’s particularly alarming is the precision of these attacks, targeting high-value accounts and leveraging social engineering tactics to outmaneuver fraud detection systems.
For fraud teams, the lesson is clear: it’s essential to monitor user journeys, especially recovery flows and login behaviors, for anomalies. Enhancing multi-factor authentication (MFA) protocols and implementing AI-driven behavioral analysis can help identify and block ATO attempts before damage is done.
2. Gmail AI Exploited for One-Time Passwords
Cybercriminals are increasingly targeting Gmail accounts through sophisticated scams designed to steal one-time passwords (OTPs). These attacks often use AI-powered voice calls to impersonate trusted entities, such as Google or financial institutions. During the call, victims are coerced into sharing their OTPs, which the attackers then use to bypass account security and gain access. Once inside, fraudsters can compromise not just Gmail, but also linked services like bank accounts, e-commerce platforms, and social media profiles.
The use of AI makes these scams particularly convincing, enabling attackers to simulate legitimate interactions and exploit users’ trust. Gmail’s role as a recovery hub for many accounts means that a single breach can have cascading effects, making these attacks even more dangerous.
Fraud fighters should focus on raising awareness about the dangers of sharing OTPs and promoting the adoption of app-based authentication methods like Google Authenticator. Implementing robust login monitoring and anomaly detection can also help identify and block suspicious activity before it escalates.
3. DoubleClickjacking Exploits: A New Pathway for ATO
A newly discovered exploit, known as DoubleClickjacking, is bypassing security measures to enable ATO attacks. This technique tricks users into unknowingly granting permissions or clicking on malicious links through deceptive overlays and interactive ads. Once fraudsters gain access to accounts, they quickly escalate their control, often targeting sensitive data or financial assets.
What makes DoubleClickjacking particularly dangerous is its stealth. Users often have no idea their clicks are being hijacked, allowing attackers to bypass even advanced fraud detection systems. The method is already being used to target high-profile platforms, including banking and e-commerce sites.
To counter this threat, fraud teams must focus on proactive defenses, such as monitoring for suspicious permission changes, enhancing clickstream analysis, and implementing real-time fraud detection tools. User education on avoiding unfamiliar links and verifying permissions before granting access is also critical to reducing exposure.
📰 Check out this "DoubleClickjacking" story from The Hacker News
===
That’s all for this week! For more insights, follow us on LinkedIn or X, and if you want to learn more about what we do, visit www.specprotected.com.
Ready to get started with Spec?
Nate Kharrl, CEO and co-founder at Spec, has built leading solutions for application security and fraud challenges since the early days of the cloud era. Drawing from his cyber experience at Akamai, ThreatMetrix, and eBay, Nate helped found Spec to focus on the needs of businesses operating in a landscape of increasing AI risks. Under Nate’s leadership, Spec grew from its mid-pandemic founding to raise $30M in venture-backed funding to build solutions used by Fortune 500 companies transacting billions in online commerce. Spec’s service offerings today include protective measures for websites and APIs that specialize in defending against attacks designed to bypass bot defenses and risk assessment platforms.