Password Attacks: How They Work and How to Defend Against Them  

how to defend against password attacks

Password attacks remain one of the most common causes of compromised hosting accounts.  

Despite advances in server-side security, firewalls, and malware detection, attackers frequently bypass these simply by logging in with stolen user credentials. 

For website owners, this can result in the website being defaced, injected with malware or used for phishing attacks. 

For resellers, it can mean multiple customer accounts compromised at once and damage to intellectual property and your brands reputation. 

Once an account is compromised, further attacks can follow, such as DNS Poisoning and Persistent XSS

In this post, we’ll explore password attacks and how to defend against them. 

Why Password Attacks Are So Effective in Hosting Environments 

Hosting platforms expose multiple authentication points by design such as control panels, CMS admin interfaces (e.g. WordPress admin), FTP/SFTP services and webmail portals. 

Attackers do not need to find a software vulnerability as seen in ‘traditional’ hacking methods if they can log in with credentials.  

Most password attacks are automated, continuous, and opportunistic, scanning the internet for weak credentials at scale. 

Common Types of Password Attacks 

Brute-Force Attacks 

A brute-force attack comprises of an attacker or bot attempting large numbers of password combinations against an authentication point.  

Modern attacks are fully automated to maximise attempts in a short window and distributed across many IP addresses to avoid detection. 

Attackers rely on probability; short passwords with limited character variation or commonly used passwords dramatically reduces the number of guesses required. 

Mitigation 
  • Long, complex & unique passwords 
  • Login rate limiting, temporary bans and lockouts 
  • CAPTCHA or challenge-response mechanisms (StackProtect
  • MFA/2FA (Multi-Factor Authentication/Two-Factor Authentication) 

Dictionary Attacks 

Dictionary attacks improve efficiency by replacing random guesses with curated password lists.  

These lists are frequently updated with the latest common password trends, usually seen in past data breaches. 

 These lists contain: 

  • Variations of common words 

Attack tools apply transformations (capitalisation, suffixes, special characters) to maximise success. Applying minimal changes to a password (e.g. Password123 to Pa55w0rd123!) will have little effect in mitigating this attack vector. 

Mitigation 
  • Enforce minimum length over complexity rules 
  • Block known-breached passwords 
  • Educate users on passphrases 
  • MFA/2FA 

Credential Stuffing 

Credential stuffing uses real username/password pairs obtained from third-party breaches. Often, these are leaked from an external service and published on the dark web for illicit actors to abuse.  

Due to this, even the strongest passwords fail if reused and because only a single login is attempted, brute-force prevention methods fail. 

Mitigation 
  • Unique passwords per account 
  • MFA/2FA 
  • Access Control Lists (ACL) 
  • Forced password resets after breach exposure 

Password Spraying 

Instead of attacking one account repeatedly, attackers will choose one or two common passwords and attempt them across many accounts. This is particularly affective against mailboxes and allows the attempts to stay below lockout thresholds, being more inconspicuous than brute-force attacks. 

This is particularly effective where shared password habits and weak enforcement of password uniqueness is present. 

Mitigation 
  • Detect failed attempts across accounts 
  • MFA/2FA 
  • Monitoring at the platform level 

Phishing Attacks 

Phishing bypasses technical security by exploiting user trust and gaining legitimate credentials through coercion or social engineering. 

Steps typically involve an attacker curating a fake login page that looks and acts identical to the legitimate target. They will then send out phishing emails to victims en masse to trick users into entering their credentials into the illicit site.  

The illicit website sends the credentials to the attacker, who will then use them to log into the legitimate site. Email and password combinations will also be used across different services to chance the victim reusing credentials. 

Mitigation 
  • MFA (prevents reuse of stolen credentials) 
  • Domain and certificate verification habits 

Malware-Based Credential Theft 

Malware is installed on a user’s device through phishing or other means. Typical malware will record keystrokes, steal saved browser passwords and hijack authenticated sessions. Credentials are captured before encryption or hashing takes place. 

Mitigation 
  • Endpoint security and patching 
  • MFA/2FA 
  • Limit credential reuse across environments 

Hash-Based Attacks 

If attackers obtain a password database, the passwords are usually in a hashed form and useless. Cryptographic hashes are designed to be a one-way function, meaning there is no way to reverse a hash back into its plaintext, usable form. Hashing alone always generates the same hash value for a specific password. 

Instead, attackers will utilise rainbow tables, which are large databases containing passwords and their known hash values. They will then compare hashes against their known values and use the plaintext password to access accounts. Alternatively, attackers can use passwords to generate hashes on the fly and compare the hashed values to the stolen password hashes. 

With advancements in technology, tools can crack password hashes at faster rates each year. It is impossible to provide consistent times for each password due to variables like what hashing algorithm or hardware is used.  

The below table gives a rough idea of just how easy it can be. 

rainbow table showing how easy hash attacks can be
Mitigation 
  • Slow, adaptive password hashing algorithms, such as Bcrypt 
  • Salting 
  • Strong password policies 
  • MFA/2FA 

Salting is the process of adding unique random values to a password before hashing. This changes the resulting hash even if two users choose an identical password. 

With salting, identical passwords produce different hashes, which renders precomputed rainbow tables become useless. Attackers would need a separate table for each salt value which is unfeasible in most cases. 

Tracking Compromised Data 

Monitoring services that scan breach databases for stolen content are available online, such as Have I Been Pwned?

This service collects and analyses thousands of database dumps containing leaked account information and allows users to search for their own information by entering their email address. 

Reports include the company that leaked the data, what data was leaked and the date of the incident. 

Why MFA Changes the Threat Landscape 

Multi-factor authentication introduces a second requirement that adds an extra layer of security to accounts. This is often categorised as something you have (authenticator app, hardware token) or something you are (biometrics). 

This means stolen passwords alone are insufficient, automated attacks fail at the second step and credential reuse becomes irrelevant. 

For resellers, MFA can be the difference between one compromised login and dozens of affected customers. 

Condisder enabling MFA/2FA on your account today. 

Special Considerations for Resellers & Agencies 

Reseller accounts represent a higher-value target because they often control multiple hosting environments, have elevated privileges and are reused across internal systems. 

Best practices include: 

  1. MFA on all reseller and admin-level accounts 
  1. Strict application of the principle of least privilege 
  1. Separate credentials per service 
  1. Regular access reviews and audits 

Final Thoughts 

Password attacks are constant, automated and relentless with compromises occurring through authentication, not software exploits. Regardless of how good server security is, password attacks are still a monumental threat. 

Modern prevention relies on strong, complex and unique passwords coupled with MFA. Active measures like auditing and frequently updating passwords is imperative to keeping existing accounts secure. 



Managed Cloud Hosting

Previous Article

The 2026 Web Designer Survey: How AI, Pay and Location are Reshaping the Industry

Next Article

Brand New HostShop Widgets

Write a Comment

Leave a Comment

Your email address will not be published. Required fields are marked *