Types of Cyber Attacks: Password Attacks
Malicious threat actors (hackers) are always developing new techniques to breach passwords. This article lists the different types of password attacks and some defences/counter-measures which can be used to enhance password security. In our experience, hackers are most successful at accessing school systems unlawfully using these methods. Passwords continue to be a primary target for cyber criminals seeking unauthorised access to accounts.
Password security is a shared responsibility and proactive measures can go a long way in preserving online safety.
- Brute Force Attacks - involve systematically attempting all possible combinations of characters until the correct password is discovered. Ways to mitigate brute force attacks are account lockouts or measures like CAPTCHA to slow the repeated login attempts down.
- Dictionary Attacks - the attacker uses a precompiled list of commonly used passwords, dictionary words, and known phrases. By systematically trying each entry, they can gain access to an account. Counter measures would include enforcing strong password policies, such as password complexity requirements.
- Phishing Attacks - involve the hacker tricking users into revealing their passwords through fraudulent means. Attackers typically send deceptive emails, masquerade as legitimate organisations or create fake login pages to steal user credentials. To combat phishing attacks, individuals should be cautious while opening emails, double-check the authenticity of the websites and enable multi factor authentication to add an extra layer of protection. View our article: A guide to multi-factor authentication. Run a phishing campaign through our Knowledge Bank (which all our customers have access to).
- Keylogger Attacks - are malicious software of hardware devices designed to record a user's keystrokes, including passwords. These captured keystrokes are then transmitted to the attacker for analysis. To prevent keylogger attacks maintain up-to-date antivirus software, avoid downloading files from untrusted sources and use virtual keyboards when entering passwords on public computers.
- Rainbow Table Attacks - attackers use precomputed tables containing a vast number of password hashes and their corresponding plain text passwords. by comparing the stolen password hashes with the entries in the table, they can rapidly discover the original passwords. Implementing robust cryptographic techniques can effectively mitigate rainbow table attacks.
- Credential Stuffing - exploits the fact that many users reuse passwords across multiple platforms. Attackers obtain username-password combinations from data breaches on other websites and systematically try them on other platforms. To combat credential stuffing, users must adopt unique passwords for each service and utilise password managers to generate and store complex passwords securely.
Defences and Counter-Measures
- Use a complex password and multi factor authentication
- Lock accounts after a number of successful attempts
- Check your physical hardware
- Run a virus scan
- Monitor your account compromises. Use haveibeenpawned.com to check whether your email address is connected to any recent leaks and so vulnerable.
- Enable encryption on your router
- Use a VPN
Use our Password Checklist to see how robust your password policies and procedures are.
Further guidance from the NCSC about passwords: Password Policy: updating your approach.
Visit our Password Best Practice Library for help and guidance.
Read our article about passwords: Passwords - simplifying the approach.
ICO Password guidance: Passwords in online services.
What to do in the event of a Cyber Attack
Incidents or attacks where any security breaches may have taken place, or other damage was caused, should be reported to an external body.
The SLT digital lead will be responsible for assigning someone to report any suspicious cyber incidents or attacks. This person will need to report this to:
- Action Fraud on 0300 123 2040, or the Action Fraud website
- the DfE sector cyber team at
This email address is being protected from spambots. You need JavaScript enabled to view it.
You may also need to report to:
- the NCSC website if the incident or attack causes long term school closure, the closure of more than one school, or serious financial damage
- the ICO website within 72 hours, where a high risk data breach has or may have occurred
- your cyber insurance provider (if you have one), such as risk protection arrangement (RPA)
- Jisc, if you are a part of a further education institution
You must act in accordance with:
- Action Fraud guidance for reporting fraud and cyber crime
- Academy Trust Handbook Part 6, if you are part of an academy trust
- ICO requirements for reporting personal data breaches
Police investigations may find out if any compromised data has been published or sold and identify the perpetrator.
Preserving evidence is as important as recovering from the crime.
Forward suspicious emails to
