If you're running remote access software, you're vulnerable to as-of-yet undetectable malware. Instead of trying to convince you to download the malware, hackers have started brute-forcing their way into business computers by cracking login information.
After they've uncovered your remote access information, the hackers will install a program called "Backoff," a tool meant to steal credit-card information from popular Point of Sale systems. The Department of Homeland Security and the Secret Service explained the danger of Backoff in this joint statement:
At the time of discovery and analysis, the malware variants had low to zero percent anti-virus detection rates, which means that fully updated anti-virus engines on fully patched computers could not identify the malware as malicious.
This means that any business could be vulnerable to this kind of attack. Until security companies find a way to patch the hole, the only way to stay safe is to understand how to stop hackers from "brute forcing" your remote access login information.
While the DHS and Secret Service originally released the report to warn business owners, anyone who uses remote access software is vulnerable. Here's how to stay safe from "brute force" hacks.
A brute force hack involves testing every possible combination of user ID and password until something works. To avoid getting your login information brute forced, you need to use remote access software that locks a user out of an account after a specific number of attempts.
Brute forcing a password takes many attempts, and the best way to keep hackers from doing this to your business is to limit that number. If your remote access software doesn't let you set a specific number of attempts, then either send the company an email or get a new remote access program. It's the only way to stay safe.