Cloud Account Takeovers

Why this matters: When attackers seize your cloud account (Google, Microsoft 365, Dropbox, iCloud, etc.), they can read email, steal files, reset passwords elsewhere, and impersonate you—often without you noticing.

What Is a Cloud Account Takeover?

A cloud account takeover happens when criminals gain unauthorized access to your online accounts and storage. From there, they can download private files, access backups, send phishing emails from your address, and lock you out.

How Attackers Gain Access

  • Phishing: Fake login pages steal your username & password.
  • Credential stuffing: Reused passwords from past data breaches.
  • MFA fatigue/prompt bombing: Spamming push approvals until you accept.
  • Malware/keyloggers: Capturing credentials from infected devices.
  • Insecure sharing/links: Public links exposing sensitive files.
Cloud account takeover infographic (FakeID 101)
Replace with your final infographic (optional).

How to Protect Yourself

If Your Account Is Compromised

  1. Regain access: Use account recovery to change your password immediately.
  2. Rotate passwords on any accounts that used the same or similar password.
  3. Revoke sessions/tokens: Sign out of all devices; remove suspicious third-party apps.
  4. Check sharing & files: Remove unknown shares; review recent activity & download logs.
  5. Enable/upgrade MFA: Move from SMS to an authenticator app or security key.
  6. Warn contacts: Attackers may send phishing from your address; tell people to ignore recent messages.

For Organisations & Schools

Common Red Flags

Tip: Regularly review your cloud provider’s Security Checkup (Google) or Security Dashboard (Microsoft 365).
⬇ Download Checklist (PDF) ← Back to Training Library