A brute force attack is a popular cracking method that involves guessing usernames and passwords to gain unauthorized access to a system or sensitive data. While a relatively simple, brute force methods continue to have a high success rate and account for over 80% of attacks on web applications.
While some attackers continue to perform manual brute force attacks, most use automated tools and scripts that leverage commonly used password combinations to bypass authentication processes or try to access encrypted data by searching for the right session ID. Other common targets for brute force attacks are API keys and SSH logins.
And increasingly, attackers use real user credentials obtained from data leaks, data breaches, or the dark web.
The purpose of brute force attacks can range from stealing personal information and disrupting service to infecting web page visitors with malware or ransomware.
Brute force attacks can also occur in the early stages of more sophisticated cyberattacks, typically as a form of reconnaissance or initial infiltration into the first layer of security.
To launch a cyberattack attackers need to gain a point of entry. Brute force techniques are a "set and forget" method of gaining access.
If the brute force attack works, attackers can use privilege escalation or abuse poor access control to gain additional access. This is why strong passwords, defense in depth, and the principle of least privilege are important parts of any cybersecurity strategy.
Additionally, brute force attacks can be used to test whether different addresses return valid webpages which could be exploited due to known vulnerabilities.
It's not uncommon to get an email from a third-party vendor or service provider telling you that someone has attempted to log into your account from a random location.
When this happens, it can be an indication that you've fallen victim to a brute force attack. If this happens to you, we suggest updating your passwords immediately.
In fact, many security-conscious organizations will rotate or change passwords on a regular basis to minimize the risk of undetected or unreported brute force attacks.
If you suspect your organization or your users are under attack, here are some things to look for:
Brute force attacks happen all the time and there are numerous high profile examples:
As brute force attacks don't rely on vulnerabilities or exploits, keeping software up to date isn't enough to protect yourself. A few common methods you can use to prevent brute force attacks:
Brute force attacks rely on reused or weak passwords. Passwords that have the following characteristics can prevent brute force attacks:
Read our guide on how to create a strong password here.
iOS users can learn how to check the strength of their passwords here.
For a brute force attack to work, it needs to be able to test the credentials against a login page. Many automated URLs use the default login page URL and scan the web for victims.
For example, a brute force attack tool might scan the web for WordPress sites and navigate to /wp-login.php, WordPress' default login page.
Changing /wp-login.php to /yoursite-login can be enough to mitigate the risk of many automated attacks. Unfortunately, this won't work for more targetted attacks or if the page is linked from other parts of your site.
Brute force attacks rely on being able to attempt multiple passwords and accounts in a single session. Consider using lockout functionality to restrict the number of times an incorrect login can be tested.
A common way to do this is to temporarily ban an IP address from logging in after three failed attempts, where subsequent failures are banned for longer and longer periods.
A CAPTCHA is a type of challenge-response test used in computing to determine whether or not the user is human. By using a CAPTCHA solution, you can prevent bots and automated tools from testing username and password combinations on your website by forcing them to complete a challenge before submitting the form.
reCAPTCHA is a free security service that protects your websites from spam, abuse, and brute force attacks provided by Google.
Two-factor authentication prevents the compromise of a single authentication factor (like a password) from compromising the account. The mechanism typically works by requesting the traditional login information, then sending a confirmation to a device, usually a smartphone, such as a text, phone call, or in-app security verification screen.
Ideally, only the authorized person would have the smartphone and could then accept or reject the authentication requests as necessary. More advanced mechanisms can require bio-authentication, such as a fingerprint swipe, which prevents lost or stolen phones from being used to falsely issue confirmations.
There are a number of popular brute force attack tools:
UpGuard Breach Risk's identity breaches module searches for third-party data breaches on the open, deep, and dark web and shows you where an employee's credentials have been exposed. If we find a match, we will add the breach name, risk, data exposed, date of breach, publish date, notification status, and number of employees exposed to your UpGuard account.
We can also help you assess your other security controls by monitoring your organization for 70+ security controls providing a simple, easy-to-understand security rating and automatically data exposures in S3 buckets, Rsync servers, GitHub repos, and more.