Brute Force Attacks: Techniques, Types & Prevention | Splunk (2024)

Brute force attacks are a common way of compromising user credentials to steal valuable information from individuals and organizations. This article explains Brute Force Attacks, current trends, their impacts on organizations, the various types and how to prevent them.

(Already a Splunk user? Learn how to detect brute force behavior with Splunk.)

What's a Brute Force Attack?

A brute force attack is a relatively old technique from threat actors and cyberattackers — but today it is widely used and remains highly effective. Attackers use brute force attacks to:

  • Crack passwords
  • Decrypt encrypted data
  • Gain access to unauthorized systems, websites or networks

In this technique, attackers use trial and error to guess the information they require, testing every possible combination. For example, they repeatedly try many possible login credentials or password combinations. These attacks are often automated, depending on software to try a vast number of combinations in a short period of time.

The name ‘brute force’ makes sense: using brute force, for anything, is a way of achieving something by strength — not always with the best skills, strategy or aids (technology).

In hacking, attackers use undue force to achieve their goal. Attackers often use them as a last resort since they can be time-consuming and may not always be successful. There is one use case in particular for brute force attacks: they are particularly effective against systems with weak passwords or other vulnerabilities. Therefore, organizations must use strong, unique passwords and implement other security measures to protect against brute-force attacks.

Brute force trends

To be resilient against any cyberattack, organizations must ensure their workforce is well-educated on the latest cyberattacks. Splunk’s Top 50 Cybersecurity Threats provides the latest list of the most common cyber threats. With cutting edge knowledge from the Splunk Threat Research Team, the annual report includes:

  • The 50 most common security threats mapped to the
  • How they are being used
  • Impacts on your organization
  • Prevention mechanisms

In 2023, brute force attacks remain a common cyber threat that should inform your overall threat intelligence.

Consequences of brute force attacks

Like most attacks, the impact of a brute force attack varies depending on:

  • The target
  • The attacker's motivations

Once attackers gain access to the system and network of the user account of interest, they can steal valuable personal information like bank and credit account details, personal identity details, health information, etc. Attackers can sell that information to third parties for profit, with little regard for the harmed individuals.

Breaking into organizational database accounts can result in large-scale, sensitive data breaches, like the recent LastPass breach which has major complications for individuals and enterprises alike. (In the LastPass breach, CNET reports that “most sensitive data is encrypted”. That doesn’t solve the issue that the threat actors can use brute force to attack stolen local files.)

There’s the systems side of these attacks, too. Brute force attacks can…

  • Consume significant computing resources like CPU time and bandwidth.
  • Impact the performance of the targeted system, making it more difficult for legitimate users to access the system.

And then there's long-term fall out. Imagine that your company systems and data are compromised due to a brute force attack. Beyond the immediate loss, potential long-term ramifications may include damage to your company’s reputation, loss of customer trust in your data protection protocols — and ultimately lack of trust in your brand. Your organization may also face legal consequences, such as fines or imprisonment, based on the nature of the attack and applicable data protection laws.

Brute force attacks can also allow attackers to spread malware into your systems. Upon compromising a website, they can set website links to redirect to malicious websites infected with malware and entice users to download them. What's more: threat actors can put spam ads on compromised websites, earn money from them and install spyware to track the activities of website visitors.

Therefore, the impacts of a brute force attack can be significant and have far-reaching consequences for the targeted system or organization.

Brute Force Attacks: Techniques, Types & Prevention | Splunk (1)

Types of brute force attacks

There are several types of brute force attacks. Threat actors might choose one based on their execution method and the targets they are designed to attack. Let’s take a look at some common types of brute force attacks:

  • Simple brute force attacks
  • Dictionary attacks
  • Hybrid brute force attacks
  • Reverse brute force attacks
  • Credential stuffing
  • Rainbow table attacks
  • Password spraying
  • Brute force attacks on RDP connections

Simple brute force attacks

In a simple brute force attack, attackers try to crack a small number of possible simple passwords or keys quickly. These attacks may be effective against systems with weak passwords or simple password policies. For example, this attack can easily and quickly guess simple passwords with common expressions like “name12345” and without a combination of upper- and lower-case letters.

Attackers can perform it manually or use automation and scripts. While automated attacks may be more efficient, they are also more likely to be detected and blocked by security systems. However, this technique is generally ineffective against stronger passwords or systems with robust security measures.

Dictionary attacks

A dictionary attack involves trying different possible passwords with a pre-arranged list of words, typically taken from a dictionary, against a username. The attacker will use a program to try different combinations of words and phrases to eventually guess the correct password. Apart from using unabridged or special dictionaries, attackers can also augment words by including numbers and special characters in the words to create passwords. Additionally, attackers can use passwords that have been leaked by earlier data breaches to perform dictionary attacks.

Dictionary attacks can be effective as many people choose passwords that are simply words or phrases. The program of the attacker can easily guess these kinds of passwords.

Hybrid brute force attacks

A hybrid brute force attack combines a dictionary attack with a traditional brute force attack. In a hybrid attack, the attacker will use a set of random characters like in a traditional brute force attack and a program to try a list of common words and phrases like in a dictionary attack.

Combining these two techniques can make a hybrid attack more successful than a single dictionary attack or a traditional brute force attack. The reason is that it allows the attacker to try both common and less common password options.

Reverse brute force attacks

In a usual BF attack, attackers do not know the password they are guessing. As the name implies, a reverse BF attack acts on in reverse. For example, if the attacker knows the PIN or password they are looking for, they will try to find the matching username by searching through millions of usernames.

For this approach, attackers usually use passwords leaked by earlier data breaches that can be found online. This process can also be automated to speed up the attack.

Credential stuffing

Many users can use the same credentials for multiple user accounts. Credential stuffing is reusing a stolen list of username and password pairs to gain unauthorized access to other accounts. The hackers use automated tools to try these stolen credentials on various websites. If they succeed, they can potentially gain access to sensitive personal and financial information.

Beware: these attacks can go undetected — hackers are using legitimate login credentials.

Credential stuffing attacks can be particularly damaging if the attackers perform malicious activities for a long time without the consent and awareness of the user. By the time the user has realized it, large damage that is not easily repairable might have been done.

(Get all the details on credential stuffing.)

Rainbow table attacks

Rainbow tables are the precomputed tables containing the hash values used to crack passwords. Rainbow table attacks can be used to crack hashes of passwords that have been hashed using a variety of hashing algorithms, including MD5, SHA-1, and NTLM. Attackers can quickly look up the corresponding plaintext for a given hash without executing the computationally intensive process of hashing all possible plaintexts and comparing the result with the target hash.

Password spraying

Password spraying is applying one common password to too many accounts. Here, the attacker tries several commonly used passwords against many accounts instead of trying all the possible combinations of characters. Password spraying attacks are often successful as many people use the same password for multiple accounts. They provide attackers access to many accounts with a relatively low level of effort by trying a small number of common passwords against many accounts

This approach also lets attackers escape lockout policies that restrict the number of password attempts. Single sign-on (SSO) and cloud-based apps that use federated authentication are the common targets of this type of attack.

(Learn how to detect password spraying attacks.)

Brute force attacks on RDP connections

With the switch to pandemic-era work-from-home for many employees, the use of remote desktop protocol (RDP) connections has increased significantly. With this increase, brute force attacks onRDP connections have also increased. If attackers can correctly guess the password to a remote RDP connection, they can spread laterally throughout the network, injecting malware.

Preventing brute force attacks

You’ll never be 100% protected from brute force. Still, lots of protection is better than none. Here are some ways you can prevent BF attacks.

Use strong and unique passwords

You must use strong, unique passwords that are not based on words or phrases in a dictionary. Strong passwords should be at least eight characters long and contain a mix of upper and lowercase letters, numbers, and special characters.

  • Avoid using common words or personal information in your passwords, as they can be easily guessed.
  • Ignore the most common passwords.
  • Implement policies to reject weak passwords and enforce users to change their passwords frequently.

See what our SURGe team thinks about whether to use password managers (hint: YES), even in light of recent breaches:

Enable multi-factor authentication (MFA)

MFA provides an extra layer of security to your accounts by requiring you to provide more than one form of authentication in addition to your password. This could be a code sent to your phone, a biometric scan or a security token.

Regularly monitor login activity

Keep track of login activities, like the number of failed login attempts and the failed IP addresses of users and locations. Regular monitoring helps organizations identify and respond to brute force attacks before and as they are happening.

(.)

Use rate-limiting

Limit the number of login attempts made within a certain period and lock down the account after a certain number of login attempts. This makes it more difficult for the attacker to guess the password.

Use CAPTCHA

A CAPTCHA can determine whether the user is a human or a computer. You can make it more difficult for automated brute-force attacks to succeed by requiring users to complete a CAPTCHA before attempting to log in.

Stay up to date

Attacks surfaces grow by the day. Knowing what’s happening is key to prevention: Read expert-recommendedsecurity articles and books, attend in-person and onlinesecurity eventsand build resilience into everything across the enterprise.

(Learn more about cyber & digital resilience.)

Fight brute force smartly

A brute force (BF) attack is an effective technique cyber attackers use to crack passwords, decrypt encrypted data, or gain access to unauthorized systems, websites, or networks. Several BF attacks include simple, hybrid, and reverse attacks, credential stuffing, password spraying, etc. Moreover, BF attacks on RDP connections are prevalent nowadays due to the rise of remote working.

Brute Force Attacks: Techniques, Types & Prevention | Splunk (2024)

FAQs

Brute Force Attacks: Techniques, Types & Prevention | Splunk? ›

Brute-force protection safeguards against a single IP address attacking a single user account. When a given IP address tries and fails multiple times to log in as the same user, brute-force protection: Blocks the suspicious IP address from logging in as that user. Sends an email to the affected user.

What is brute force protection? ›

Brute-force protection safeguards against a single IP address attacking a single user account. When a given IP address tries and fails multiple times to log in as the same user, brute-force protection: Blocks the suspicious IP address from logging in as that user. Sends an email to the affected user.

What is the software for brute force attack prevention? ›

IPBan is an effective tool for preventing brute force attacks and blocking repeated login attempts from a specific IP address. It works when many failed login attempts come from a single IP address. In this case, IPBan automatically blocks that IP from making further attempts.

Which of the following security features allows you to protect against brute force attacks? ›

Locking Accounts

The most obvious way to block brute-force attacks is to simply lock out accounts after a defined number of incorrect password attempts.

How are brute force attacks detected? ›

One of the most common signs of a brute force attack is multiple failed login attempts from the same IP address. If you notice this, it could indicate that an attacker is trying to guess your login credentials using automated tools.

What is an example of a brute force technique? ›

For example, imagine you have a small padlock with 4 digits, each from 0-9. You forgot your combination, but you don't want to buy another padlock. Since you can't remember any of the digits, you have to use a brute force method to open the lock.

What is a brute force problem-solving strategy? ›

In computer science, brute-force search or exhaustive search, also known as generate and test, is a very general problem-solving technique and algorithmic paradigm that consists of systematically checking all possible candidates for whether or not each candidate satisfies the problem's statement.

What are brute force solutions? ›

A brute force algorithm solves a problem through exhaustion: it goes through all possible choices until a solution is found. The time complexity of a brute force algorithm is often proportional to the input size. Brute force algorithms are simple and consistent, but very slow.

Does the firewall stop a brute force attack? ›

Web Application Firewalls (WAF):

WAFs deliver robust capabilities for preventing brute force attacks, including: Detection and prevention of automated login attempts. Blocking IP addresses displaying suspicious login behavior. Filtering out malicious traffic and blocking known attack signatures.

Can IPS prevent brute force attack? ›

In general, to prevent brute force attacks, administrators can set limitations on the number of login trials and shut down the traffic of brute force attacks with an intrusion prevention system (IPS) at the entry point to their services.

Does bruteforce still work? ›

A brute force attack is a relatively old technique from threat actors and cyberattackers — but today it is widely used and remains highly effective. Attackers use brute force attacks to: Crack passwords. Decrypt encrypted data.

What is the simplest way to stop brute force cyberattacks? ›

How to Prevent Brute Force Attacks
  • Strong Password Policy.
  • Multi-factor Authentication.
  • Limit Login Attempts.
  • Use a CAPTCHA.
  • Monitoring and Incident Response for Brute Force Attacks.
  • Secure Coding Practices to Prevent Brute Force Vulnerabilities.
  • Intrusion Detection System (IDS)
Jul 27, 2023

How effective are brute force attacks? ›

How successful are brute force attacks? Theoretically, brute force attacks have a 100% success rate, though the hacker may have to wait years for their automated systems to correctly guess a complex password.

What is the list for brute force? ›

Some of the most commonly found passwords in brute force lists include: date of birth, children's names, qwerty, 123456, abcdef123, a123456, abc123, password, asdf, hello, welcome, zxcvbn, Qazwsx, 654321, 123321, 000000, 111111, 987654321, 1q2w3e, 123qwe, qwertyuiop, gfhjkm.

What does it mean to use brute force? ›

: relying on or achieved through the application of force, effort, or power in usually large amounts instead of more efficient, carefully planned, or precisely directed methods.

What is brute force protection in Malwarebytes? ›

This is also known as a brute force attack. Our Brute Force Protection (BFP) feature monitors Microsoft's Remote Desktop Protocol by protecting your devices from suspicious connections via remote devices. It temporarily blocks IP addresses with suspicious login attempts and notifies you of the blocks.

Is brute force illegal? ›

Because they involve unauthorized access to personal data, brute force attacks are almost always illegal. The only occasion where this attack type would be legal is during system security checks.

What is the brute force protection period? ›

Overview. If triggered, brute force protection makes requests - coming from an IP address via a brute force protected entrypoint - slower for up to a 24 hour period. In extreme circ*mstances it may prevent access outright, for up to 30 minutes, from a problematic IP address.

References

Top Articles
Latest Posts
Article information

Author: Rev. Leonie Wyman

Last Updated:

Views: 5997

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Rev. Leonie Wyman

Birthday: 1993-07-01

Address: Suite 763 6272 Lang Bypass, New Xochitlport, VT 72704-3308

Phone: +22014484519944

Job: Banking Officer

Hobby: Sailing, Gaming, Basketball, Calligraphy, Mycology, Astronomy, Juggling

Introduction: My name is Rev. Leonie Wyman, I am a colorful, tasty, splendid, fair, witty, gorgeous, splendid person who loves writing and wants to share my knowledge and understanding with you.