It might be difficult to appreciate the consequences of a brute force attack until seeing what criminals do if they are successful. Oftentimes, a brute force attack is the just first step in a much larger cybercrime like a major breach or online fraud.
Here are some typical goals that criminals might have when committing brute force attacks:
Commit Identity Theft
Once cybercriminals break into an online account with a brute force attack, they have access to all the information needed to commit identity theft. With compromised identities in hand, fraudsters can perpetrate more advanced crimes such as ATO and new account fraud (NAF).
With ATO, fraudsters use stolen credentials to gain unauthorized access to a victim’s existing accounts, such as banking apps, email, or social media profiles. Once inside, they can change account details and make unauthorized transactions.
When it comes to NAF, criminals use stolen identities to create new accounts in the victim's name. These new accounts can include lines of credit, loans, or even utility services – causing significant financial distress for the victim.
Track User Activity
Once a fraudster accesses a network with a brute force attack, they can freely monitor user activity. As criminals gather more information about the person in question, they can use the data to perpetrate more serious crimes.
An example would be a fraudster gaining access to the email account of a financial services executive. Once inside, the criminal monitors email exchanges and waits until a major transaction occurs. At the perfect time, the bad actor sends a fraudulent wire transfer link from the compromised email account. The crime is completed when the financial services client is tricked into transferring a large sum of money into a fraudulent account.
Perpetrate Malware Attacks
Successful brute force attacks also set the stage for fraudsters to launch malware. In these situations, criminals might redirect website traffic to a malicious site designed to steal sensitive information. Or, they may directly infect a site with hidden spyware.
Fictitious sites are meticulously crafted to resemble legitimate websites, making it difficult for users to recognize the difference. When redirected to these websites, users are tricked into entering personal information such as credit card numbers.
When they infect a website with spyware, fraudsters secretly collect personal data like browsing habits and keystrokes. In some instances, the harvested data is sold to advertisers without user consent to enhance targeted marketing efforts.
Vandalize Websites
When an attacker gains access to a website via a brute force attack, it also opens the door to the site being vandalized. In these instances, cybercriminals often deface the site with offensive or inappropriate content. In turn, this content tarnishes the organization’s reputation and drives away visitors and customers.
From time to time, attackers demand a ransom to restore the defamed website to its original state. This type of extortion leverages the need of a website owner to regain control of their online presence.