Brute Force Attack
Brute Force Attack
A brute force attack is a hacking method that uses trial and error to crack
passwords, login credentials, and encryption keys. It is a simple yet reliable tactic
for gaining unauthorized access to individual accounts and organizations’ systems
and networks. The hacker tries multiple usernames and passwords, often using a
computer to test a wide range of combinations, until they find the correct login
information .The name "brute force" comes from attackers using excessively
forceful attempts to gain access to user accounts. Despite being an old cyberattack
method, brute force attacks are tried and tested and remain a popular tactic with
hackers.
2. Dictionary Attacks
A dictionary attack is a basic form of brute force hacking in which the attacker
selects a target, and then tests possible passwords against that individual’s
username. The attack method itself is not technically considered a brute force
attack, but it can play an important role in a bad actor’s password-cracking
process. The name "dictionary attack" comes from hackers running through
dictionaries and amending words with special characters and numbers. This type of
attack is typically time-consuming and has a low chance of success compared to
newer, more effective attack methods.
1. GitHub
Perhaps the largest brute-force attack to be recorded in recent history affected
GitHub in 2013. This particular brute-force password-guessing attack proved to be
quite successful, as several accounts were compromised in the process. Even
though GitHub stores passwords securely, criminals managed to compromise some
accounts with relative ease.
During the attack, researchers identified brute-force login attempts being executed
from close to 40,000 unique IP addresses. It remains unclear where the list of
“weak” passwords came from. However, it is evident the attacks used a list of
usernames and passwords they obtained through a different hack. It remains
unclear how many accounts have been affected by this 2013 brute-force attack, as
GitHub never officially disclosed that information.
2 .ALIBABA’S TAOBAO (2015)
In February of 2016, it became clear the popular e-commerce platform TaoBao
was affected by a massive brute-force attack. This platform, owned by the Alibaba
group, saw close to 21 million user accounts getting compromised. This attack
took place between October and November of 2015. A database containing 99
million usernames and passwords was used to brute-force existing TaoBao
accounts. One in five of these attempts was successful, which highlighted how
often people reuse bad passwords.
3. US UTILITY’S CONTROL SYSTEMS (2014)
To this date, it remains unclear which US utility company was compromised
during this brute-force attack in 2014. According to Homeland Security, criminals
were unsuccessful in gaining access to critical systems. However, that does not
mean this attack should be overlooked by any means, as it highlights the dire need
for better cyber security precautions in the utility industry. This particular attack
was likely executed through an online portal which grants access to basic control
systems.
4. CLUB NINTENDO (JULY 2013)
Nintendo has always been a popular company among gaming enthusiasts. Club
Nintendo is a community membership site, where millions of users discuss
everything related to their favorite company. In July of 2013, evidence surfaced of
Club Nintendo suffering a major brute-force attack, which affected 25,000 forum
members. It took hackers over 15 million brute-force attempts to crack these
accounts. All affected accounts were promptly suspended until access had been
restored to the rightful owners.