Skip to main content
Opgenomen Webinar: Chargebacks Verminderen met Browserlaag-intelligentie (cside x Chargebacks911)
Blog
Blog

Best practices to prevent account takeover fraud (eCommerce)

eCommerce accounts are targeted daily by attackers. See the best practices, fingerprint signals, and prevention tools eCom companies use to stop ATO.

Apr 08, 2026 7 min read
Juan Combariza
Juan Combariza Growth Marketer
Best practices to prevent account takeover fraud  (eCommerce)

TL;DR

  • eCommerce accounts are targeted by ATO because successful break-ins are easy to monetize. Saved credit cards, addresses, and loyalty points are lucrative for attackers.
  • ATO fraud is costly. Chargebacks fall on the merchant (avg. $576 per incident) and 42% of ATO victims cancel their account entirely. Companies like The North Face have faced attacks that compromised 200,000+ users.
  • Prevention best practices include enforcing risk-based MFA, hardening account recovery flows (not just login), monitoring for credential stuffing with device-level signals, and building a response playbook for your team when an attack hits.
  • Most eCommerce teams use a combination of three tool types: MFA and identity verification (Okta, Duo), device fingerprinting and bot detection (cside, DataDome), and anti-fraud suites (Sift, Signifyd).

Why eCommerce accounts are attractive targets for ATO

Graphic - Why eCommerce accounts are targeted in ATO - cside

Many shoppers have weak password hygiene on eCommerce accounts. If used for one-off purchases or lower-ticket items customers do not think carefully about account security and reuse passwords across multiple sites. At the same time, eCommerce teams are under constant pressure to prioritize conversion rates rather than strong security measures.

ATOs on eCommerce accounts are easy to monetize:

  • Attackers get immediate access to saved payment methods, addresses, loyalty points, and personal data.

High login volume also works in the attacker’s favor. Fraud activity is harder to spot when it is mixed into thousands of legitimate customer sessions. This elevates risk around seasonal spikes such as Black Friday, flash sales, or product release days.

What is ATO Fraud (eCommerce)

Account takeover fraud happens when an attacker gains access to a real customer account and uses it for fraud or abuse. In eCommerce, this usually means an attacker gets into an existing shopper account through credential stuffing with reused passwords, phishing, or weak password reset and recovery flows.

Account takeover fraud rose 23% from 2024 to 2025, and is expected to climb rapidly as AI-agent-driven attacks are able to avoid traditional bot detection measures with stealth browsers.

Best practices for eCommerce companies to stop Account Takeover Fraud

1. Require stronger authentication at the right moments (MFA)

  • Enforce MFA on high-risk accounts. Accounts with saved payment methods, large loyalty balances, or admin access should require multi-factor authentication.
  • Trigger step-up verification for unusual logins. A customer logging in from a new device, unfamiliar IP, or different country should be prompted for additional verification.
  • Don't apply MFA universally if it kills conversion. Risk-based MFA (where challenges only appear when something looks off) keeps friction low for legitimate users.

2. Protect password reset and account recovery just as much as login

  • Rate-limit reset requests. A burst of password reset attempts targeting multiple accounts is a credential stuffing signal.
  • Verify identity before allowing recovery. Email-only recovery is weak if the attacker already controls the inbox. Add device verification or secondary contact methods

3. Watch for ATO signals using risk-based detection

  • Evaluate device and browser signals. Device fingerprinting, browser configuration, and screen resolution create a baseline for each user. Deviations from that baseline may be indicators of compromise.
  • Factor in network signals. VPN usage, proxy detection, IP reputation, and geolocation mismatches all add context to whether a login is legitimate.
  • Track behavioral patterns. An account that logs in and immediately navigates to payment settings or changes a shipping address is behaving differently than a returning customer browsing products.

4. Catch credential stuffing and automated login abuse early

Repeated login attempts, bot-driven testing, and stealthier automation are often part of an ATO attempt. This has become harder to catch with the rise of stealth browsers (which grow by 11x in 2025 according to a report from cside) that evade CAPTCHAs and traditional bot detection.

  • Don't rely on IP-based rate limiting alone. Residential proxies make IP reputation nearly useless as a standalone signal.
  • Layer detection signals. TLS fingerprinting, device consistency checks, and mouse/keyboard behavior patterns catch automated sessions that pass surface-level bot checks.

5. Create response playbooks for suspected ATO

  • Challenge: Present step-up authentication to give the real account holder a path back in
  • Notify: Send an alert to the account holder so the customer knows something happened, even if they aren't logged in
  • Lock: For high value accounts restrict sensitive actions on the account (payment changes, high-value orders, address updates)
  • Investigate: Review what changed during the session - - new addresses, payment methods, orders placed - - to determine whether damage was done

6. Review historical patterns and tune thresholds by season

Peak commerce periods fundamentally change what "normal" login behavior looks like. Useful tuning steps include:

  • Reviewing prior seasonal login behavior
  • Adjusting rules ahead of major campaigns
  • Accounting for normal traffic spikes
  • Retuning after each high-volume period

7. Make sure your own website isn't stealing user credentials

Code injections are one of the most overlooked ATO vectors in eCommerce. Attackers can inject malicious scripts directly into your site that redirect users to phishing pages or hijack active sessions, bypassing MFA entirely.

It's the same attack surface that enables web skimming. Magecart-style attacks alone compromised over 23 million transactions in 2025.

  • Monitor your 3rd and 1st party scripts continuously. Third-party tags, analytics snippets, and ad pixels all introduce code you don't control. Any one of them can be compromised and turned into an injection point.
  • Use a web security platform like cside. To automate 3rd party script monitoring, cside Client-side Security watches for data exfiltration attempts or code injections on your website that aim to steal customer credit card details or account credentials.

Best account takeover prevention tools for eCommerce companies

No single tool covers every angle of ATO prevention. Most eCommerce companies need a combination of solutions across three categories.

  • MFA / identity verification: These tools add a second layer of authentication beyond passwords (think one-time codes to email or SMS). Examples include Okta Adaptive MFA and Auth0.
  • Fingerprinting / bot detection: Fingerprinting and bot detection tools analyze the technical and behavioral signals behind each session (device configuration, browser environment, mouse behavior, IP reputation). They can catch credential stuffing and automated abuse early, but primarily serve to collect raw signals used by your fraud workflows to identify ATO. Strong options for eCommerce here are cside and DataDome.
  • Anti-fraud suites: These are all-in-one platforms that score risk across login, payment, and post-transaction activity. They typically aim to manage fraud across multiple surfaces in one solution. Sift and Signifyd are well established vendors for eCommerce.

Real world examples of ATO attacks on eCommerce companies

The North Face has infamously suffered 4 credential stuffing attacks between 2020 and 2025 that have now affected 200,000+ of their customers. Even though the stolen credentials came from unrelated third-party breaches (not a compromise from within the North Face's systems), the major attack in 2020 forced them to send a public notice notifying customers of the breached credentials that caused brand damage.

That's how many ATO attacks play out: A customer reuses a password from another site, an attacker gets that credential pair from a breach dump they buy on the dark web, and then run scripted login attempts on your site when traffic is low. At 3am, one of the logins succeeds. By morning, the shipping address has been changed, a $400 order has been placed with the stored card, and the real customer gets a confirmation email for something they never bought.

Why account takeover matters for eCommerce:

ATO isn't just a security problem. Successful attacks impact revenue, operations, and customer retention at the same time:

  • Fraud losses: Attackers drain stored payment methods, loyalty points, gift card balances, and place fraudulent orders.
  • Chargebacks and refund disputes. When fraudulent orders are placed through a legitimate account, the merchant eats the chargeback fees. Disputing it is nearly impossible since it is genuine fraud. ATO chargebacks cost 76% more than regular chargebacks for an average of $576 per incident.
  • Customer trust damage. "My account was hacked" sticks with people. 42% of ATO victims cancel their account on the platform where it happened.
  • Support and ops costs. ATO drives a surge in password resets, account recovery tickets, and manual order reviews.
  • Compliance and security governance. Strong account security posture matters during audits, vendor assessments, and internal control reviews.
  • Cyber insurance implications. Insurers increasingly evaluate MFA adoption, access controls, and fraud prevention measures during underwriting.

The role of fingerprinting in account takeover detection

Passwords can be stolen. MFA can be bypassed. Browser fingerprinting adds a detection layer that collects signals from the device, browser, and session that help fraud teams identify and reduce Account Takeovers.

  • Collect signals that indicate ATO: Browser fingerprint, hardware identifiers, screen properties, and network metadata form a unique profile for each visitor. When parts of that profile look abnormal (a mismatched timezone, a strange screen resolution) it can indicate an ATO attempt. Teams can build custom rules around these signals or use pre-built risk combinations to flag high-risk sessions automatically.
  • Detect automated ATO attempts early: One device cycling through hundreds of username-password combinations. A browser claiming to be Chrome on macOS but running in a headless Linux environment. Login requests arriving at inhuman speed from rotating residential proxies. Fingerprinting catches the signatures of credential stuffing bots and scripted attacks that slip past CAPTCHAs and rate limiters.

Why cside is the best fingerprinting option for eCommerce companies

Image of cside fingerprint session activity dashboard
Image of cside fingerprint session activity dashboard

cside combines browser fingerprinting with deep JavaScript integrity monitoring to protect sensitive flows on your eCommerce website.

  • Malicious AI bot detection: cside detects headless browsers and the new generation of AI-powered agents that bypass traditional bot defenses to carry out credential stuffing and other automated abuse.
  • Protects the pages attackers target most: Beyond ATO prevention, cside secures login forms, checkout pages, and payment flows against web skimming, data exfiltration, and session hijacking. It's a leading solution for PCI DSS 4.0.1 script monitoring requirements.
  • Third-party script monitoring: cside watches every script served to users (including third-party tags, analytics snippets, and ad pixels) to identify when any of them begin stealing customer credit card data or account credentials.
  • Developer-first integration: Raw fingerprint signals available via API for teams that want to build custom fraud rules, plus curated signal groupings ready out of the box.

To get started, sign up or book a demo.

Juan Combariza
Growth Marketer Juan Combariza

Researching & writing about client side security.

Don't just take our word for it, ask AI

FAQ

Frequently Asked Questions

Most eCommerce merchants rely on a layered stack. That usually includes MFA providers like Okta or Duo for login authentication, device fingerprinting and bot detection tools like cside or DataDome to catch automated abuse and suspicious sessions, and anti-fraud suites like Sift or Signifyd for transaction-level risk scoring.

Start with risk-based MFA across accounts. Harden password recovery and account reset flows, not just login pages, since attackers often target the weakest workflow. Then monitor for credential stuffing using device fingerprinting and behavioral signals, build a clear response playbook (lock, challenge, notify, investigate), and tune thresholds before peak periods like Black Friday.

The highest-confidence signals tend to be device-level: a login from an unrecognized device fingerprint, a browser environment that doesn’t match its claimed user agent, or the same device attempting access across multiple unrelated accounts in a short time window. Network signals such as sudden geolocation shifts, VPN or proxy usage, and IP reputation changes add context. Behavioral signals matter too, for example when an account logs in and immediately changes the shipping address or payment method.

Yes. cside offers a fingerprinting API built for eCommerce environments that returns raw device, browser, and network signals you can feed into your own fraud scoring logic. It also provides pre-built high-risk signal groupings to quickly flag suspicious sessions and extends into client-side threat visibility such as script injection and session hijacking.

In 2020, The North Face disclosed a credential stuffing attack where attackers reused credentials from unrelated third-party breaches to access customer accounts. Between 2020 and 2025, more than 200,000 North Face customers were affected across four separate credential stuffing incidents.

eCommerce accounts are highly monetizable because they often contain saved credit cards, shipping addresses, loyalty points, and gift card balances. Attackers can extract value within minutes. At the same time, many platforms default to weaker authentication settings because conversion optimization often outweighs security considerations.

Monitor en Beveilig Je Third-Party Scripts

Gain full visibility and control over every script delivered to your users to enhance site security and performance.

Start gratis, of probeer Business met een proefperiode van 14 dagen.

cside dashboard interface met script monitoring en beveiligingsanalytics
Related Articles
Boek een demo