Linchakin

Brute Force Attacks are on the Rise as June sees a 671% increase

 September 16, 2021     No comments   

Brute Force AttacksWith nearly one-third of all organizations targeted in a single week and just above one-quarter on the average, attempts to access externally facing resources is growing in popularity and success.

One of the ways cybercriminals have traditionally gained access to victim networks is through good old fashioned trying with a dash of automation and scripting to speed up the process. Brute force attacks have been around as long as hackers have been trying to break into networks. But modern threat actors no longer sit at a keyboard and the network isn’t always the target, as automation makes breaking into an account opportunistic and targeting cloud-based applications makes it easier to do so remotely.

According to new data from Abnormal Security, in their Q3 2021 Email Threat Report, the typical week sees about 10% of organizations being targeted with brute force attacks. June saw as much as 32.5% of organizations targeted – the same week Abnormal Security saw a nearly 7x jump in the number of attacks.

The thinking is this massive jump in the number of attacks has to do with “the increased attention around credential phishing and account takeovers”, according to the report.

SaaS-based applications are readily accessible to anyone on the Internet. All that’s required is a username and password. And with literally billions of (hopefully) old sets of account usernames and passwords available on the Dark Web, it’s relatively easy for threat actors to utilize a semi-legitimate (albeit older) data source to pound against cloud-based services in the hopes of gaining access.

While this massive jump is a one-off spike, it does indicate what’s possible as the norm in the future. Continual Security Awareness Training would dictate that proper password hygiene be in place that includes not using the same passwords across systems, nor between personal and business accounts.

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • 26th Sep - Spatial vs Temporal Data MiningSpatial data mining refers to the process of extraction of knowledge, spatial relationships and interesting patterns that are not specifically stored … Read More
  • 26th Sep - MongoDB $cmp OperatorWhat is the $cmp operator in MongoDB? MongoDB provides a variety of aggregation pipeline operators. The $cmp operator is one of those operators. The $… Read More
  • DongTai - An Interactive Application Security testing(IAST) Product That Supports The Detection Of OWASP WEB TOP 10 Vulnerabilities, Multi-Request Rel... 中文版本(Chinese version) About DongTai IAST DongTai IAST is an open-source passive interactive security testing (IAST) product. It uses dynamic hooks a… Read More
  • 26th Sep - Descriptive vs Predictive Data MiningThe descriptive and predictive data mining techniques have huge applications in data mining; they are used to mine the types of patterns. The descript… Read More
  • Android Alternatives: List of Best Open Source Mobile OSAndroid is an open-source operating system developed by Google. Android is based on the modified version of the Linux kernel. This OS is designed main… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates