All Categories
Advanced Authentication & Authorization
Technical concepts: AAL levels, SSO, federated identity, and modern auth systems
1. The Story: How a Stolen SSO Token Emptied $847K
And what every fraud team missed
Tuesday 09:15 – Fraud analyst Jessica Chen sees an alert: customer David Thompson has wired $50,000 to a crypto exchange from an IP in Eastern Europe. Classic ATO, she thinks.
Initial checklist
- ✅ Customer confirmed the transfer is fraudulent.
- ✅ Password unchanged for 12 months.
- ✅ No failed logins in platform logs.
- ❌ MFA still enabled and working.
- ❌ No SIM‑swap on the phone line.
- ❌ Customer email uncompromised.
The ❌ items break the "stolen‑password" pattern, hinting at something deeper.
On a call, David adds: "I usually login with Google so I don't need the password."
(This is federated SSO: Google acts as the identity provider (IdP), using OAuth to pass a login token.)
Jessica realises this is an OAuth token replay attack. The attacker compromised David's Google account through a phishing email, then used the stolen OAuth tokens to access his banking. By day three the fraud total reaches $847,000 (three wires).
How OAuth tokens get compromised:
- Email account phishing (most common)
- Social media account compromise
- Malware stealing browser tokens
- Man-in-the-middle attacks on public WiFi
The Attack Timeline
Phase | Attacker step | Why bank rules missed it |
---|---|---|
1 | Phish Google account | No PayWave login yet |
2 | Steal OAuth token on social login | Token looks valid, no failures |
3 | Replay token via API – 3 wires, $847,000 | Platform trusts Google, MFA already satisfied |
2. Why This Matters: The Authentication Evolution
Traditional fraud investigation assumed stolen passwords. But modern attacks exploit the trust relationships between systems:
- Social login means compromising any provider (Google, Apple, Facebook, Microsoft) = accessing dozens of connected apps
- Enterprise SSO means one stolen corporate login = access to all business systems
- OAuth tokens can be replayed for hours/days without triggering password alerts
- Session attacks bypass authentication entirely by stealing "logged in" status
Bottom line: Understanding how modern authentication works is now essential for effective fraud investigation.
3. Core Concepts
Before diving into technical terms, let's break down the building blocks of how authentication works today and why attackers are targeting complexity instead of brute force.
3.1 Single Sign‑On (SSO) – The "Master Key"
SSO type | How it works | Typical attacker move | In this case? |
---|---|---|---|
Social login | Site trusts Google / Apple account | Reuse stolen OAuth token | ✔️ |
Enterprise SSO | One corporate login unlocks all apps | Phish company IdP creds | — |
Analogy: Social login is a VIP wristband you show at each club. Enterprise SSO is a master key that quietly opens every door once you're inside.
3.2 Three Authentication Factors (easy mnemonic)
There are three standard categories of authentication factors used to verify identity. Understanding these helps fraud analysts pinpoint how an attacker got in and what was bypassed.
Something You Know
- Examples: password, PIN, security question answer
Something You Have
- Examples: mobile device, OTP code, hardware key, passkey (a device-stored credential that typically requires biometric unlock, combining something you have and something you are)
Something You Are
- Examples: fingerprint, facial recognition, voice ID
These three are the foundation of all MFA systems. Most secure systems require at least two, one from "know" and one from "have" or "are."
3.3 Authentication Assurance Level (AAL) – "Lock Strength"
Level | Door lock analogy | Common MFA | Fraud worry |
---|---|---|---|
AAL 1 | Cheap latch | Password only | Bot stuffing |
AAL 2 | Deadbolt + code | SMS‑OTP, Authenticator app | SIM‑swap, push fatigue |
AAL 3 | Vault lock | Hardware key (FIDO2) | Rare, but costly to bypass |
3.4 Identity Assurance Level (IAL) – Trusting the Person, Not Just the Password
IAL tells us how confident we are that a person is who they say they are not just whether their login is secure.
IAL 1 — "Trust me"
- User self‑declares name. Easy for fake IDs.
IAL 2 — "Scan my licence"
- Upload documents or answer credit questions. Safer, but docs can be forged.
IAL 3 — "Show up in person"
- Clerk verifies your government ID face‑to‑face. Hardest to fake, least convenient.
3.5 Sessions – Why "Staying Logged In" Matters for Fraud
What fraud analysts need to know: When someone logs into a website, they get a "stay logged in" pass (called a session). This is like a temporary visitor badge - no need to show ID again until it expires.
Think of it like a visitor badge at a company: once you check in, you can walk around until it expires.
Why this matters for fraud:
- Attackers can steal these "visitor badges" without knowing passwords
- One stolen session = full account access until it expires
- Traditional "failed login" alerts won't trigger
Red flags to watch for:
- Account active from multiple countries simultaneously
- Sessions lasting much longer than user's normal pattern
- Rapid activity right after a legitimate login
Key concept: Understanding sessions helps explain why some account compromises don't show typical "failed login" patterns - the attacker never needed to guess passwords.
4. Why OAuth/SSO Systems Create New Attack Surfaces
Understanding these patterns helps fraud analysts recognize why modern authentication creates new vulnerabilities:
OAuth/SSO Complexity | Why It Creates Risk | What This Means for Fraud |
---|---|---|
Viewer → Owner role jump in minutes | OAuth tokens carry embedded permissions | Single compromised token = instant privilege escalation |
Low‑priv token accessing high‑priv endpoints | Token reuse across different scopes | One stolen token works in multiple systems |
Burst of admin invites after SSO login | Attackers establish persistence | SSO compromise = backdoor creation capability |
Service tokens triggering user actions | Blurred boundaries between systems | Automated attacks can masquerade as human activity |
Key insight: OAuth and SSO create "permission inheritance" - when one system trusts another, attacks can escalate across system boundaries.
5. Common Attack Patterns
Understanding these attack patterns helps fraud analysts recognize when advanced authentication systems are being exploited:
Attack Type | What Happens | Why It Works |
---|---|---|
OAuth Token Replay | Attacker steals and reuses OAuth tokens | Tokens often valid for hours, no password required |
Session Hijacking | Steal browser session cookies | Session keeps user "logged in" without re-authentication |
Push Fatigue | Spam user with MFA notifications | User approves one notification to stop the alerts |
SSO Compromise | Compromise the identity provider account | One breach = access to all connected applications |
Key concept: Modern attacks often target the trust relationships between systems rather than individual passwords.
6. Understanding Modern Authentication Attack Patterns
These patterns illustrate why traditional fraud detection struggles with OAuth/SSO attacks:
- Permission‑grant storms - OAuth systems can grant broad permissions instantly, unlike traditional role-based systems
- Off‑hours automation - Token-based attacks don't follow human schedules like password-based attacks
- Velocity anomalies - Tokens enable rapid-fire actions that bypass traditional rate limiting
- Cross-system access - SSO allows one compromised account to access multiple unrelated systems
- Session vs. API confusion - Modern attacks blur the line between human and automated access
Why this matters: These patterns reflect the fundamental differences between password-based and token-based authentication systems.
7. Why Understanding Modern Authentication Matters for Fraud Analysts
Conceptual foundation for modern fraud investigation:
- Recognize system architecture - understanding OAuth/SSO helps you grasp why attacks work differently than traditional credential theft
- Ask informed questions - "Do you use Login with Google?" reveals federated authentication and changes your investigation approach
- Understand evidence sources - knowing that OAuth creates logs in multiple systems (IdP, application, API gateway)
- Collaborate with technical teams - speaking the same language about AAL, IAL, and SSO builds credibility and gets better information
Connection to Account Security 101: Remember the RBAC concepts and privilege escalation from the fundamentals? OAuth and SSO are modern implementations of those same principles, but with cross-system trust relationships that create new attack possibilities.
Key insight: Modern fraud often exploits the complexity and trust relationships of authentication systems rather than weak passwords.
8. Key Terms
For complete definitions of authentication and ATO terminology, see the ATO Glossary.
Core concepts from this module:
- OAuth tokens - Digital passes that enable SSO access without passwords
- SSO - Single Sign-On systems that create cross-application trust relationships
- AAL/IAL - Authentication and Identity Assurance Levels for security classification
- Token replay - Reusing stolen authentication tokens before expiration
- Federated authentication - Using external identity providers for login
9. Key Takeaways
- One stolen SSO token can beat any local password.
- SMS MFA ≠ hardware key – AAL matters.
- IdP & API logs often reveal what bank logs hide.
- Understanding token architecture helps fraud analysts collaborate effectively with security teams.
- Session attacks bypass traditional authentication monitoring.
- Modern fraud investigation requires understanding OAuth, SAML, and SSO architecture.
Next: ATO 101 → investigate account takeover attacks using these authentication concepts.
Fast Facts (Real-World Statistics for 2024–2025)
-
Phishing accounts for over 60% of breaches involving web applications and SSO identity providers.
(Verizon Data Breach Investigations Report (DBIR) 2025) -
Nearly 80% of organizations using federated logins (OAuth, SAML) reported at least one token replay or token theft incident in 2024.
(Auth0 State of Secure Identity Report 2024) -
Phishing-resistant MFA methods (FIDO2/WebAuthn) reduce successful account takeover attacks by more than 99% compared to SMS-based or push notification MFA.
(Microsoft Entra Identity)
Fast Facts (Real-World Statistics for 2024–2025)
-
Phishing accounts for over 60% of breaches involving web applications and SSO identity providers.
(Verizon Data Breach Investigations Report (DBIR) 2025) -
Nearly 80% of organizations using federated logins (OAuth, SAML) reported at least one token replay or token theft incident in 2024.
(Auth0 State of Secure Identity Report 2024) -
Phishing-resistant MFA methods (FIDO2/WebAuthn) reduce successful account takeover attacks by more than 99% compared to SMS-based or push notification MFA.
(Microsoft Entra Identity)
Test Your Knowledge
Ready to test what you've learned? Take the quiz to reinforce your understanding.