Cybersecurity Reference > Glossary
What is a Brute Force Attack (BFA)?
Think of it as the digital equivalent of trying every key on a massive keyring until one finally opens the lock. The attacker uses automated tools to cycle through combinations of letters, numbers, and symbols at high speed, sometimes making millions of attempts per second depending on the system's defenses.
What makes these attacks genuinely concerning isn't their sophistication—they require no special cleverness—but their persistence and inevitable success given enough time. A seven-character password without rate limiting can fall in minutes; an eight-character password might hold out for hours.
Even with throttling in place, determined attackers can distribute their attempts across multiple IP addresses or stretch them over weeks and months, turning brute force into a patient game of attrition. The attack succeeds not through elegance but through sheer computational grinding, making it one of the oldest and most reliable methods in an attacker's toolkit.
Origin
By the 1970s, as password-based authentication spread through early time-sharing systems, brute force evolved into a practical attack vector rather than a theoretical curiosity. The technique gained notoriety in the 1980s when hobbyist hackers began sharing password-cracking tools on bulletin board systems.
Through the 1990s and 2000s, the rise of powerful graphics processors and distributed computing turned what was once a slow, grinding process into something frighteningly fast. Rainbow tables and other optimization techniques emerged to make certain brute force attacks nearly instantaneous. The fundamental concept hasn't changed in decades, but the speed has increased by orders of magnitude, making yesterday's "secure enough" password laughably inadequate today.
Why It Matters
The attacks have grown more dangerous as computing power has become cheaper and more accessible—an attacker with a modest graphics card can now attempt billions of password combinations per second against a stolen hash database. Cloud computing has made distributed brute force trivially easy to orchestrate, allowing attackers to bypass rate limiting by spreading attempts across thousands of IP addresses.
The shift to remote work has expanded the attack surface, with VPNs, remote desktop services, and cloud applications all presenting authentication endpoints that attackers probe constantly. Organizations that rely solely on passwords face continuous pressure from these attacks, which is why modern security frameworks emphasize multi-factor authentication and passwordless approaches. The brute force attack won't disappear as long as passwords exist, making it a foundational concern for anyone responsible for protecting systems.
The Plurilock Advantage
We implement throttling mechanisms, monitor for distributed attack patterns, and deploy multi-factor authentication that makes brute force attacks impractical regardless of computational power.
Our team has defended against these attacks across government and enterprise environments, and we bring that real-world experience to securing your systems with defenses that actually hold up under sustained assault.
.




