Skip to content

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Account Takeover Fraud (ATO)

What is ATO?

In Account Takeover Fraud (ATO), cyber criminals deliberately gain unauthorized access to a victim's online bank, payroll, health savings or social media account, with the goal of stealing money or information for personal gain. Cyber criminals may gain access to a victim’s online account through a variety of methods:

Brute Forcing username/password
A cybercriminal exploits weak password and lack of multi-factor authentication.
Phishing emails
A cybercriminal sends a deceptive email to trick the victim into giving away their login credentials.
Phishing domains/websites
A cybercriminal uses a phishing website that appears as a legitimate online banking or payroll website to trick the victim into giving away their login credentials.
Social engineering
A cybercriminal manipulates the victim into giving away their login credentials by impersonating a bank employee, customer support or technical support personnel.
Data breaches
A cybercriminal obtains victim's login credentials from past data breach or criminal forums that sell data breach data on the dark web marketplaces.
Malware
A cybercriminal obtains victim's login credentials via malware on the victim’s device.

The goal of the cybercriminals is to steal funds, redirect paychecks, or otherwise affect funds of the targeted victim.

Search Engine Optimization (SEO) Poisoning ATO

In one specific type of scam, cyber criminals buy ads that masquerade as legitimate companies to misdirect victims searching for a specific website through popular search engine such as Google, Yahoo, or Bing. The search engine may return a fraudulent website URL that is very similar to the legitimate website, or slightly misspelled, or re-directed to another website with the URL that appears legitimate.

When victims click on the fraudulent search engine ad, they are directed to a sophisticated fraudulent phishing site that mimics the real website, tricking victims into providing their login information. Cyber criminals then capture victims' credentials as they access the fraudulent site.

If the account requires multi-factor authentication, cyber criminals may utilize social engineering to obtain the One-Time Passcode (OTP). For example, cybercriminal pretends to be a bank employee or technical support personnel and requests the victim to provide their phone number via fraudulent website's chat box. The cybercriminal then contacts the victim while pretending to be the bank employee/technical support and ask for the OTP.

If the account is a corporate account which requires two individuals to authorize a transaction (dual control) then, cyber criminals may utilize social engineering in a similar manner as above, and insist that the second individual go to the same website, and/or go to the open browser of the first individual to complete the transaction.

Cyber criminals then use the captured credentials to gain full access to the victim’s financial account. If a bank account is compromised, cyber criminals can transfer money from the accounts. If an employer payroll account, health savings account, or retirement account is accessed, the cybercriminal can change the direct deposit information in the real site and redirect funds. If cyber criminals gain access to full personally identifiable information (PII) for victims, they can also create new account relationships, including loans or accounts that defraud victims.

Stay Protected

To remain on guard against ATO, follow the tips below:

  • Be careful about the information you share online or on social media. By openly sharing things like a pet's name, schools you've attended, your date of birth, or information about your family members, you can give scammers all the information they need to guess your password or answer your security questions.
  • Monitor your personal financial accounts on a regular basis for irregularities, such as missing deposits.
  • Always use unique complex passwords, enable two-factor (or multi-factor) authentication on any account that allows it, and never disable it.
  • Use Bookmarks (Chrome) or Favorites (Edge) for navigating to login websites rather than clicking on Internet search results or advertisements. Multi-factor authentication will not protect you if you land on a fraudulent login page. Carefully examine the email address, URL, and spelling in any correspondence.
  • Stay vigilant against phishing attempts. Be suspicious of unknown "banking" or "company" employees who call you; don't trust caller ID. Offer to call them back after you look-up the phone number yourself. Remember that companies generally do not contact you to ask for your username, password, or OTP.

What To Do In Case Of An ATO Incident

  1. Contact Your Bank

    Contact the originating Financial Institution as soon as fraud is recognized to request a recall or reversal as well as a Hold Harmless Letter or Letter of Indemnity.

  2. Reset or Revoke Compromised Credentials

    Reset all credentials that may have been exposed during the intrusion, including user and service accounts, compromised certificates, or other "secret" credentials.

  3. File a Complaint

    File a detailed complaint with www.ic3.gov. It is vital the complaint contain all required data in provided fields, including banking information. Be sure to use the key words "account takeover" or "SEO poisoning" in the incident description.

  4. Stay Informed

    Visit www.ic3.gov for updated Industry Alerts and PSAs regarding ATO trends, as well as other cyber-enabled fraud schemes.

Terms and Conditions

Prior to filing a complaint with the IC3, please read the following information regarding terms and conditions.

Should you have additional questions prior to filing your complaint, view FAQ for more information on inquiries such as:

  • What details will I be asked to include in my complaint?
  • What happens after I file a complaint?
  • How are complaints resolved?
  • Should I retain evidence related to my complaint?

Complaints filed via this website are analyzed and may be referred to federal, state, local or international law enforcement and partner agencies for possible investigation.

The complaint information you submit to this site is encrypted via secure socket layer (SSL) encryption. Please see the Privacy Policy for further information.

We thank you for your cooperation.


By clicking "I Accept" you acknowledge the following:

I understand any contact or investigation regarding any complaint I file on this website is initiated at the discretion of the agency receiving the complaint information. I will not be contacted by the IC3.

The information I'm providing on this form is correct to the best of my knowledge. I understand that providing false information could make me subject to fine, imprisonment, or both. (TITLE 18, U.S. CODE, SECTION 1001)