Table of Contents
Economic software package firm Intuit not long ago educated consumers of its TurboTax solution of a series of opportunity account takeovers, permitting entry to some individually-identifying information and facts.
Intuit insisted in a breach notification letter to consumers that the takeover assaults did not amount to a “systemic facts breach of Intuit.” Even further, it famous that the risk actors obtained credentials through “a non-Intuit supply.”
We consulted with cybersecurity authorities about the TurboTax Attack Takeovers. Here’s what they experienced to say.
Intuit Informs TurboTax Customers of Account Takeovers
Kim DeCarlis
Kim DeCarlis is the CMO at PerimeterX.
“Account takeover (ATO) attacks are a main menace to any company. It is considerably less complicated and rewarding to stroll in via the front doorway of a electronic business enterprise with valid stolen qualifications than to seem for holes in an organization’s cybersecurity defenses. PerimeterX analysis located that in between 75-85% of all login attempts in the second half of 2020 ended up account takeover attempts. Unfortunately, this was the situation for TurboTax. Organizations need to have to be knowledgeable of signals that they’ve been attacked – which include surges in enable desk phone calls, spikes in password resets and inhuman user behaviors these kinds of as thousands of login attempts on an account in a limited time time period – and just take correct motion. Individuals have to have to make sure they are applying different passwords on every single web page and locking down their credit reports as nicely.”
Saryu Nayyar
Saryu Nayyar (she/her) is CEO of Gurucul.
“This is the holy grail for cyber-criminals and a nightmare for TurboTax customers. Armed with social protection quantities and related personally identifiable facts (names, addresses, start dates), criminals can immediately open credit history card accounts (and a host of other accounts) and store until they fall – all on the victim’s identification. And the cleanse-up to apparent one’s name is agonizing and continuous for all the victims. This unique breach was avoidable in that qualifications were stolen from other on the internet solutions subsequent previous details breaches. It simply cannot be overstated that people today have to adjust all passwords following a breach notification. Credentials need to never be reused. You completely have to have exceptional credentials for just about every and each individual provider, primarily these wherever you are transacting economic facts.”
Baber Amin
Baber Amin is COO of Veridium.
“Password reuse and its downstream implications are the crucial with what occurred at TurboTax. However, password reuse is nonetheless a norm, irrespective of warnings, due to the fact as mere typical people we have a constrained capacity to try to remember passwords. Given the ever-rising will need to be digital in every aspect of our life, quite a few reuse passwords.
“The flip aspect of this coin is credential stuffing. When a password is compromised and accessible, it can be applied to impersonate precise actual users.
“The very best way to do away with this vector is to eliminate passwords. No Password = no credential to things. The next-finest way to remove credential stuffing is to incorporate contextual multifactor authentication that is both dynamic dependent on threat or centered on static rules. This is the lowest priced way to thwart a credential stuffing assault. Possibly way details to both removing the weakest url or shoring it up.”
James McQuiggan
James McQuiggan is Stability Recognition Advocate at KnowBe4.
“This credential stuffing assault is very valuable. It provides access to personalized details about the user, their tax info, and of course, their social safety figures for them and perhaps their immediate loved ones.
With above 8.4 million passwords in the wild and above 3.5 billion of those passwords tied to genuine e-mail addresses, it gives a setting up point for cyber criminals to concentrate on several on line web-sites that make use of accounts for their consumers. If people set up accounts with the previously uncovered passwords, they are creating it uncomplicated for cyber criminals to steal their details.
End users should really make sure they are working with powerful passwords or passphrases for all of their accounts and, in which offered, employing Multi-Component Authentication (MFA) to defend and safe their accounts. This way, in the event of a password credentialing attack, it will cut down their danger of publicity to dropping their sensitive, private knowledge.”
David Stewart
David Stewart is CEO of Approov.
“Credential stuffing attacks, using usernames/passwords extracted from unconnected data breaches, are a person of the most common account takeover mechanisms. The simplest way to protect against this sort of exploits is to assure that usernames/passwords on their personal are not plenty of to attain entry to backend programs. Introducing a necessity for proper and independently verified added elements (eg 2FA, biometrics, application authentication) to obtain obtain to your servers will make your enterprise considerably a lot less most likely to suffer account takeover attacks.”
Purandar Das
Purandar Das is Co-founder and Chief Strategist at Sotero.
“This is an illustration of the cascading and prolonged-long lasting impact of details breaches. Details stolen from a person or much more businesses is compiled and then sold to criminals. Even though it is uncomplicated, in this scenario, to assert that there was no systemic breach it still puts a highlight on the organization that was applied to entry account data. At the really least, twin-variable authentication would have prevented this difficulty. More time-term companies have to account for the reality the stolen data or user credentials is extensively available. Accounting for that with dual-variable authentication or unit-based mostly accessibility in the small phrase and ML-dependent authentication is a should. Passing the blame on to the customer is not acceptable. It is just not feasible nor sustainable to thrust the onus on shoppers to generate and manage tens if not hundreds of passwords.”
Thanks to these industry experts for their time and expertise on the TurboTax Account Takeovers. For more on safeguarding your employees’ and privileged users’ credentials, down load the Id Administration Buyer’s Guideline or the Solutions Suggestion Motor.

Ben Canner
Ben Canner is an business engineering author and analyst covering Identification Management, SIEM, Endpoint Security, and Cybersecurity writ big. He holds a Bachelor of Arts Degree in English from Clark College in Worcester, MA. He beforehand worked as a corporate blogger and ghost author. You can achieve him via Twitter and LinkedIn.
