Account Takeover Integration

Account Takeover

  • Overview

    What is Account takeover? Account takeover is when a fraudster gains control of an account that belongs to a genuine customer. Phishing, spyware and malware can all be used to commit account takeover attacks. However, for many merchants credential stuffing is the most common tactic used. Credential stuffing is the automated process of using stolen username and password combinations in order to gain access to customer accounts. Fraudsters can monetize the attack in a number of ways, from making unauthorised transactions with a saved card or stolen card details to selling accounts and personal details to others.

    Read More
  • Integration Process

    This page explains the account takeover integration process. Our dedicated guides will help you to integrate with Ravelin seamlessly. Ravelin team will help you through the integration from start to finish. We will work with you to understand how your platform and Ravelin can best work together to stop account takeover, optimize conversion and support growth. Before Integration During the initial sales meetings, we will: Develop a deep understanding of your registration, login and checkout flow.

    Read More
  • Requesting Recommendations

    Recommendations at login To request an account takeover recommendation when a customer attempts to log in, send a request to our Login endpoint using the Login Checkpoint. To use the Login Checkpoint add score=login as a query parameter to the URL. The login object should contain details about the login attempt. An example request is shown below: POST HTTP/1.1 Authorization: token ... Content-Type: application/json { "timestamp": 1512828988826, "login": { "username": "jsmith123@example.

    Read More
  • Reclaiming Accounts

    This page explains how to tell us an account has been resecured after an account takeover. In cases where an account is reclaimed by the legitimate owner you need to notify us that the account has been secured. Secured means that the password has been reset and any tokens have been revoked, ensuring that attackers no longer have access to the account. Reclaiming an account after it has been resecured is important, otherwise we may block the legitimate owner from accessing the account.

    Read More
  • Breached Credentials

    What are breached credentials? Breached credentials are used by fraudsters when committing credential stuffing attacks. Attackers get credential combinations (usernames and passwords) from data breaches. Fraudsters can then automatically try all these combinations against your login page to see if there are any matches. Unfortunately, because a lot of people use the same password across multiple services there may be matches and fraudsters can gain access the accounts. You can read more about how fraudsters use breached credentials in our Ravelin Insights Guide.

    Read More
  • Testing Your Integration

    As with all software, it’s important to get it working, and then keep it working. Ravelin has multiple features to aid you in testing your integration. Force Specific Recommendations You should ensure that you are listening to the action that Ravelin returns, and handling it appropriately. Set the login.username field to an email address using one of the following three email domains to force a specific action from the Login endpoint.

    Read More