Jul 1, 2020 - Technology

Password thieves target at-home workers

A person using a fingerprint to log in.

Photo: Thomas Trutschel/Photothek via Getty Images

With so many people working from home during the COVID-19 pandemic, more cyber criminals are using “brute force” attacks to break the passwords of employees signing into their company networks remotely, according to ESET, a cybersecurity and antivirus protection firm.

How it works: Brute force attacks break into systems by trying out vast numbers of possible passwords.

  • Cyber criminal groups are targeting increasingly ubiquitously used remote login services as a way to circumvent the usual protections to company systems.
  • The criminals then often hold companies’ networks hostage via ransomware.

What they're saying: “Despite the increasing importance of [remote access services], organizations often neglect its settings and protection,” writes ESET.

  • “Employees use easy-to-guess passwords and with no additional layers of authentication or protection. ... Cybercriminals typically brute-force their way into a poorly secured network, elevate their rights to admin level, disable or uninstall security solutions and then run ransomware to encrypt crucial company data.”

Of note: Among ESET’s own users, the most commonly blocked IP addresses associated with these types of attempted intrusions came from the United States, China, Russia, France and Germany.

  • Meanwhile, most victims of these types of attempted intrusions possess IP addresses located in Russia, Germany, Japan, Brazil and Hungary, says ESET.
Go deeper