Brute Force Attacks
Brute Force Attacks
Brute Force Attacks
HYDRA
HASHCAT
SOME FAMOUS BRUTE FORCE ATTACKS
Dunkin’ Donuts (2015) Alibaba (2016)
Coffee franchise Dunkin’ Donuts suffered a brute force The popular eCommerce platform Alibaba was a victim of a brute
force attack that compromised the accounts of around 21 million
attack that led to its users losing huge sums via the users in 2016. During the attack, which took place between October
company’s mobile app and website. Hackers used brute and November that year, the attackers gained unauthorized access to
force to gain unauthorized access into the accounts of the usernames and passwords of 99 million users.
19,715 users within five days, stealing their money. Leveraging the database at their disposal, they compromised 20.6
The company was later slammed with a lawsuit for not million user accounts.
informing its users about the compromise so they could Experts revealed that the primary cause of the attack was the
take necessary measures to protect their accounts. overlapping of passwords by users. It was discovered that the
majority of the users were using the same password for the platform
Although Dunkin' Donuts initially denied playing a part in for their other accounts. Another cause of the attack was weak
the attack, it later agreed to pay the sum of $650,000 in passwords. Some of the users had weak passwords that were easy to
settlement of the lawsuit. figure out
HOW TO PREVENT BRUTE FORCE PASSWORD HACKING
To protect your organization from brute force password hacking, enforce the use of strong passwords. Passwords should:
•Never use information that can be found online (like names of family members).
•Have as many characters as possible.
•Combine letters, numbers, and symbols.
•Be different for each user account.
•Avoid common patterns.
As an administrator, there are methods you can implement to protect users from brute force password cracking:
•Lockout policy—you can lock accounts after several failed login attempts and then unlock it as the administrator.
•Progressive delays—you can lock out accounts for a limited amount of time after failed login attempts. Each attempt
makes the delay longer.
•Captcha—tools like reCAPTCHA require users to complete simple tasks to log into a system. Users can easily
complete these tasks while brute force tools cannot.
•Requiring strong passwords—you can force users to define long and complex passwords. You should also enforce
periodical password changes.
•Two-factor authentication—you can use multiple factors to authenticate identity and grant access to accounts.
BRUTE DORCE ATTACKS USING USB
DEVICES LIKE ARDUINO NANO AND RASPBERRY PI PICO CAN
BE USED TO DO THE SAME