Get all your news in one place.
100’s of premium titles.
One app.
Start reading

Password thieves target at-home workers with "brute force" attacks

With so many people working from home during the COVID-19 pandemic, more cyber criminals are using “brute force” attacks to break the passwords of employees signing into their company networks remotely, according to ESET, a cybersecurity and antivirus protection firm.

How it works: Brute force attacks break into systems by trying out vast numbers of possible passwords.


  • Cyber criminal groups are targeting increasingly ubiquitously used remote login services as a way to circumvent the usual protections to company systems.
  • The criminals then often hold companies’ networks hostage via ransomware.

What they're saying: “Despite the increasing importance of [remote access services], organizations often neglect its settings and protection,” writes ESET.

  • “Employees use easy-to-guess passwords and with no additional layers of authentication or protection. ... Cybercriminals typically brute-force their way into a poorly secured network, elevate their rights to admin level, disable or uninstall security solutions and then run ransomware to encrypt crucial company data.”

Of note: Among ESET’s own users, the most commonly blocked IP addresses associated with these types of attempted intrusions came from the United States, China, Russia, France and Germany.

  • Meanwhile, most victims of these types of attempted intrusions possess IP addresses located in Russia, Germany, Japan, Brazil and Hungary, says ESET.
Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.