Denver news in your inbox
Catch up on the most important stories affecting your hometown with Axios Denver
Des Moines news in your inbox
Catch up on the most important stories affecting your hometown with Axios Des Moines
Minneapolis-St. Paul news in your inbox
Catch up on the most important stories affecting your hometown with Axios Minneapolis-St. Paul
Tampa-St. Petersburg news in your inbox
Catch up on the most important stories affecting your hometown with Axios Tampa-St. Petersburg
Photo: Thomas Trutschel/Photothek via Getty Images
With so many people working from home during the COVID-19 pandemic, more cyber criminals are using “brute force” attacks to break the passwords of employees signing into their company networks remotely, according to ESET, a cybersecurity and antivirus protection firm.
How it works: Brute force attacks break into systems by trying out vast numbers of possible passwords.
- Cyber criminal groups are targeting increasingly ubiquitously used remote login services as a way to circumvent the usual protections to company systems.
- The criminals then often hold companies’ networks hostage via ransomware.
What they're saying: “Despite the increasing importance of [remote access services], organizations often neglect its settings and protection,” writes ESET.
- “Employees use easy-to-guess passwords and with no additional layers of authentication or protection. ... Cybercriminals typically brute-force their way into a poorly secured network, elevate their rights to admin level, disable or uninstall security solutions and then run ransomware to encrypt crucial company data.”
Of note: Among ESET’s own users, the most commonly blocked IP addresses associated with these types of attempted intrusions came from the United States, China, Russia, France and Germany.
- Meanwhile, most victims of these types of attempted intrusions possess IP addresses located in Russia, Germany, Japan, Brazil and Hungary, says ESET.