Brute Force Attacks & How to Prevent Them

We've written before about how cyberattacks are on the rise. In the rapidly evolving world of cybercrime, it’s important to understand the various types of attacks that can threaten the security of your company’s private data. A brute force attack is a common type of threat that is often underestimated due to its simplicity. However, its potential for harm is real and potent.

What is a brute force attack?

A brute force attack is a trial-and-error method hackers use to guess login information and encryption keys or find hidden web pages. The term "brute force" refers to efforts to force their way into private accounts, relying solely on the power of relentless attempts to crack the code.

How common are brute force attacks?

Google reported that brute force attacks represented more than half of attacks against cloud providers in the first quarter of 2022, fueled by large numbers of public breaches and continued use of weak passwords among many users. While they’re already prevalent, industry sources report that brute force attacks continue to rise.

How quickly can a brute force attack succeed?

The speed of a brute force attack depends on password complexity, the attacker's computational power, and the tools they use. Depending on these variables, a brute force attack might succeed in just a few seconds, or it might take years to break through​​. Automated tools can significantly accelerate these attacks. By incorporating the processing power of graphics processing units (GPUs), hackers can expedite brute force attacks even further. Modern high performance GPUs, available for around $1,600, are capable of cracking simple eight-digit passwords in milliseconds and more complex eight-digit combinations in under an hour. As a result, the old eight-character minimum guideline for secure passwords is no longer sufficient.

What forms do brute force attacks take?

There are several types of brute force attacks.

  • In a traditional brute force attack, hackers use known usernames and attempt to guess the associated passwords, either manually or using a computer program.

  • In a dictionary attack, the hackers have a list of phrases or variations on common passwords to run against specific usernames.

  • In reverse brute force attacks, hackers begin with a known password and try to match it with the appropriate username.

  • Credential stuffing involves using a known username-password combination to attempt to access additional accounts.

Dictionary attacks and credential stuffing are generally the fastest of these attacks to execute because they take advantage of the common practice of using weak or reused passwords. However, other methods can be more efficient in specific situations. For example, a reverse brute force attack is likely to be most efficient for breaking into accounts with username-password combinations leaked in a data breach. By understanding the various ways cybercriminals attempt brute force attacks, you can develop cybersecurity practices to minimize your risk.

How can I protect my information from brute force attacks?

The most important factor in blocking brute force attacks is strong password protection. For a strong password in 2023, follow these best practices:

  • Use a minimum of 12 characters

  • Use mix of uppercase and lowercase letters, numbers, and special characters (if allowed)

  • Do not use names of people, places, or organizations, or common phrases

  • Consider a pass phrase with special characters to make it unique

  • Avoid reusing passwords on multiple websites or systems

  • Consider using a trusted password manager

Additional measures to protect against brute force attacks include

  • Enabling two-factor authentication, which requires users to provide two distinct forms of identification, such as a password and a passcode delivered to their phone

  • Limiting login attempts

  • Using captchas to prevent automated processes from accessing the system

  • Keeping software up to date to take advantage of the latest patches for known security vulnerabilities

To avoid the need to rely on staff to appropriately manage vast numbers of passwords, some organizations have started moving toward "passwordless" authentication. Instead of set passwords, systems rely on devices like certificates, hardware tokens, or one-time passwords to authenticate users.

Understanding the nature of brute force attacks and the steps you can take to prevent them is critical for maintaining cybersecurity. You can help protect your business by fostering a strong culture of security and awareness of cybersecurity best practices among employees.


At Pendello Solutions, we turn technology hurdles into powerful assets. Our technology solutions fuel growth, productivity, and efficiency, through continuous innovation and strategic solutions, empowering your business beyond the imaginable. Contact us today to discover the Pendello Method.

Previous
Previous

What Is Azure?

Next
Next

Local Vs. Cloud Data Backup