'Brute force' attacks against SMBs on the rise
Rather than broad sweeps for vulnerabilities, hackers are targeting small firms
Computerworld - The number of "brute force" attacks on small and midsize companies has risen dramatically in the past few months, according to Houston-based Alert Logic Inc., an on-demand IT network security company that focuses on small and medium-size businesses.
Brute force attacks are those in which an attacker uses multiple ways to hack into a company's private network, trying various methods until the break-in attempt succeeds, said Chris Smith, vice president of marketing at Alert Logic.
Over the past three months, brute force attacks have increased by more than 1,000%, Alert Logic said in a statement. Since brute force attacks are considerably more dangerous than random e-mail-borne viruses, the increase indicates that criminals are specifically taking advantage of the lesser security measures used by smaller businesses, the company said.
"Prior to this, what we noticed out there being directed at midsize companies was the more broad-based sweeps or scans, which means that there were certain well-known vulnerabilities that were being targeted, but they were being broadly targeted," Smith said. "That means that the bad guys were broadly sweeping a bunch of companies... for these general vulnerabilities, and when they found those vulnerabilities they would find a way in."
Now, however, hackers are targeting their attacks at specific services like FTP and are employing the brute force password-cracking technique, Smith said.
"So they'll keep pounding on a particular target, trying to get through," he said. "It's more targeted, more concerted, more persistent. Part of the reason we think we're seeing this is that companies have gotten better about adopting patch managing technology and other technologies that keep those these vulnerabilities that used to be targeted... relatively covered."
Johannes Ullrich, an analyst at the SANS Institute in Bethesda, Md., agreed that brute force attacks have been on the rise for a while, but he said he hadn't seen numbers as high as those Alert Logic reported.
"Brute force attacks are amazingly successful and simple," he said. "They do not require any particular exploit, but just a script to automatically guess the right password. Over the last couple years, we see less of the classic brute force attacks where an attacker is guessing many passwords for a particular account. Instead, attackers try a small set of passwords -- even if they use a 100 or so -- against a large number of usernames. This bypasses some of the lock-out policies companies put in place to prevent brute-forcing.
"Targets of brute force attacks are SSH, FTP and Windows networking among other services," he said.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts