Reading Time: 2 minutes
A blunt force approach refers to simply trying every possible combination of numbers and characters until you find the right one. It is an approach that is guaranteed to work, if you have enough time and processing power. The trick is to make your password long enough and complex enough that cracking it is impractical. It is a testimony to the advancement in computing technologies that you need to make your passwords increasingly complex to avoid being compromised.This week, GitHub reported that it was the victim of a brute force attack assault that flooded their servers with messages from nearly 40,000 different IP addresses attempting to compromise user data and user credentials with some apparent success.When the breach was discovered, the company made sure their digital media servers reset most passwords, especially weak one’s that were the most likely to have been cracked.
In addition, user tokens, SSH keys as well as Oauth authorizations were revoked, to ensure the cyber attackers get nothing out of their malicious efforts. GitHub users were notified via e-mail and asked user to create stronger passwords and report any suspicious activity related to their accounts. GitHub will now require strong passwords.
GitHub is also implementing Two-Factor Authentication. This requires the user provide a value that only they would know, such as a validation code sent to them via email or telephone. Comodo strongly believes in the use of 2-Factor Authenticationn to protect user data and offers custom made solutions to our customer’s.
While it is unfortunate that GitHub’s defences were compromised, the company’s response was strong and appropriate. Every company that maintains user data should take not.
START FREE TRIAL GET YOUR INSTANT SECURITY SCORECARD FOR FREE
- SEO Powered Content & PR Distribution. Get Amplified Today.
- PlatoData.Network Vertical Generative Ai. Empower Yourself. Access Here.
- PlatoAiStream. Web3 Intelligence. Knowledge Amplified. Access Here.
- PlatoESG. Automotive / EVs, Carbon, CleanTech, Energy, Environment, Solar, Waste Management. Access Here.
- PlatoHealth. Biotech and Clinical Trials Intelligence. Access Here.
- ChartPrime. Elevate your Trading Game with ChartPrime. Access Here.
- BlockOffsets. Modernizing Environmental Offset Ownership. Access Here.
- Source: https://blog.comodo.com/malware/github-attack-highlights-importance-of-strong-passwords/
- :is
- :not
- 000
- 40
- a
- Accounts
- activity
- addition
- addresses
- advancement
- also
- an
- and
- any
- apparent
- approach
- appropriate
- ARE
- AS
- attack
- attempting
- attention
- Authentication
- avoid
- BE
- been
- being
- believes
- Blog
- both
- breach
- brute force
- but
- CAN
- case
- characters
- click
- code
- combination
- company
- Company’s
- complex
- compromise
- Compromised
- computing
- cracked
- create
- Credentials
- custom
- cyber
- data
- different
- digital
- Digital media
- discovered
- efforts
- enough
- ensure
- especially
- Event
- Every
- factor
- Find
- Firm
- flooded
- focusing
- For
- Force
- Free
- from
- get
- GitHub
- guaranteed
- hackers
- Have
- hosting
- http
- HTTPS
- if
- implementing
- importance
- in
- increasingly
- instant
- Internet
- Internet Security
- IP
- IP addresses
- IT
- keys
- Know
- likely
- Long
- lower
- made
- maintains
- make
- May..
- Media
- messages
- more
- most
- nearly
- necessary
- Need
- nothing
- now
- numbers
- oauth
- of
- Offers
- on
- ONE
- only
- or
- our
- out
- Password
- Passwords
- plato
- Plato Data Intelligence
- PlatoData
- possible
- power
- prevent
- processing
- Processing Power
- protect
- provide
- refers
- related
- report
- Reported
- repository
- require
- requires
- response
- right
- scorecard
- security
- send
- sent
- Servers
- should
- simply
- Sites
- Solutions
- some
- special
- strong
- stronger
- strongly
- success
- such
- sure
- suspicious
- Take
- Technologies
- testimony
- that
- The
- their
- Them
- they
- this
- this week
- time
- to
- Tokens
- two
- unfortunate
- until
- use
- User
- users
- using
- validation
- value
- via
- Victim
- was
- web
- week
- WELL
- were
- when
- will
- with
- Work
- would
- You
- Your
- zephyrnet