The number of "brute force" attacks on small and midsize companies has risen dramatically in the past few months, according to Houston-based Alert Logic Inc., an on-demand IT network security company that focuses on small and medium-size businesses.
Brute force attacks are those in which an attacker uses multiple ways to hack into a company's private network, trying various methods until the break-in attempt succeeds, said Chris Smith, vice president of marketing at Alert Logic.
Over the past three months, brute force attacks have increased by more than 1,000%, Alert Logic said in a statement. Since brute force attacks are considerably more dangerous than random e-mail-borne viruses, the increase indicates that criminals are specifically taking advantage of the lesser security measures used by smaller businesses, the company said.
"Prior to this, what we noticed out there being directed at midsize companies was the more broad-based sweeps or scans, which means that there were certain well-known vulnerabilities that were being targeted, but they were being broadly targeted," Smith said. "That means that the bad guys were broadly sweeping a bunch of companies... for these general vulnerabilities, and when they found those vulnerabilities they would find a way in."
Now, however, hackers are targeting their attacks at specific services like FTP and are employing the brute force password-cracking technique, Smith said.
"So they'll keep pounding on a particular target, trying to get through," he said. "It's more targeted, more concerted, more persistent. Part of the reason we think we're seeing this is that companies have gotten better about adopting patch managing technology and other technologies that keep those these vulnerabilities that used to be targeted... relatively covered."
Johannes Ullrich, an analyst at the SANS Institute in Bethesda, Md., agreed that brute force attacks have been on the rise for a while, but he said he hadn't seen numbers as high as those Alert Logic reported.
"Brute force attacks are amazingly successful and simple," he said. "They do not require any particular exploit, but just a script to automatically guess the right password. Over the last couple years, we see less of the classic brute force attacks where an attacker is guessing many passwords for a particular account. Instead, attackers try a small set of passwords -- even if they use a 100 or so -- against a large number of usernames. This bypasses some of the lock-out policies companies put in place to prevent brute-forcing.
"Targets of brute force attacks are SSH, FTP and Windows networking among other services," he said.