{"id":44017,"date":"2020-02-18T12:49:53","date_gmt":"2020-02-18T12:49:53","guid":{"rendered":"https:\/\/www.n-able.com\/?p=44017"},"modified":"2023-03-22T09:32:29","modified_gmt":"2023-03-22T09:32:29","slug":"how-do-hackers-steal-passwords","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords","title":{"rendered":"How Do Hackers Steal Passwords?"},"content":{"rendered":"<p>As a managed services provider (MSP), protecting yourself and your customers against password attacks is a serious business. By stealing passwords, a bad actor could gain access to top secret data, access bank accounts, or resell password information to other attackers. Because passwords are the key to so much critical information, protecting password information from attackers is critical for any modern business.<\/p>\n<h2><strong>How safe is your password?<\/strong><\/h2>\n<p>There are many different ways your customers\u2019 passwords could become compromised, and it\u2019s up to MSPs to prevent a password hacker from breaching your customers\u2019 <a href=\"https:\/\/www.n-able.com\/blog\/password-management\">password security<\/a>. To help prevent malicious computer hackers from accessing your system, you should first understand what a password attack might look like. Here are some of the most common methods used by attackers to steal passwords.<\/p>\n<p><strong>1. Trojan horse<\/strong><\/p>\n<p>Software with malicious intent is called malware. Malware is often introduced into your system via accidental download from suspicious websites that host pop-ups, or through \u201cfree download\u201d links.<\/p>\n<p>In a Trojan horse attack, an attacker disguises malware as legitimate software or a harmless link, possibly through a misleading email, a falsified website, or a fake advertisement. The downloaded malware then provides the attacker with access to your password data, as well as other data stored on your device.<\/p>\n<p>To help prevent Trojan horses, use discretion when opening links in emails and when visiting new web pages. To automatically block Trojan horses before they wreak havoc, organizations should install firewalls and make sure to encrypt all important data.<\/p>\n<p><strong>2. Keylogger <\/strong><\/p>\n<p>A keylogger attack is a type of malware attack that is specifically designed to access password data. Keyloggers operate using a fairly simple set of rules: keylogging software logs your keystrokes as soon as you start your computer, which allows attackers to access passwords\u2014no matter how complex your passwords might be.<\/p>\n<p>Helping prevent keyloggers from gaining access to a system calls for many of the same basic precautions as any other malware attack. MSPs should <a href=\"https:\/\/www.n-able.com\/blog\/ins-and-outs-security-awareness-training\" target=\"_blank\" rel=\"noopener\">educate technicians and customers<\/a> to help ensure they don\u2019t open suspicious links. In some cases, it may also be worth it to invest in keystroke encryption software. Another option is to use an encrypted password autofill service, which allows you to enter drop-down password data without typing out passwords on your keyboard.<\/p>\n<p><strong>3. Rainbow table <\/strong><\/p>\n<p>Rainbow tables aim to reverse password encryption. Encrypting your passwords is a common way to help prevent access via malware and other common hacking strategies. The most common way to encrypt passwords is by hashing, which is a one-way encryption process that has no single formula to reverse the encrypted data. Rainbow tables are expansive tools that run many potential hashing combinations in order to unencrypt hashed data. A rainbow table requires a lot of sophistication, but plenty of advanced cyberattackers know how to use them.<\/p>\n<p>To help prevent a rainbow table attack, you can \u201csalt\u201d your hash by using a function that adds random characters into your encrypted data to throw hackers for a loop.<\/p>\n<p><strong>4. Third-party <\/strong><\/p>\n<p>A third-party attack, or a supply chain attack, is when a hacker gains access to your system through an outside partner, vendor, or provider with access to your data. As MSPs often hold the key to many of their customers\u2019 systems, they are a potential target to gain access to multiple organizations at once.<\/p>\n<p>Because third-party attacks initially occur outside of your system, it\u2019s harder for password protection software to sense an attack is occurring. The best way to help prevent third-party attacks is to use a <a href=\"https:\/\/www.n-able.com\/blog\/why-every-msp-needs-password-manager?utm_medium=website&amp;utm_source=direct&amp;utm_campaign=pm-glbl-lt-dgp-ppwebsite-2019-07-03&amp;utm_content=blog&amp;promo=blog\" target=\"_blank\" rel=\"noopener\">safe and reliable password manager<\/a> to help ensure attackers cannot run away with your master vault. Third-party attacks can have devastating consequences not only in the form of the immediately compromised data, but also through lost customer confidence and loyalty.<\/p>\n<p><strong>5. <\/strong><strong style=\"background-color: transparent;font-size: 1em\">Brute force <\/strong><\/p>\n<p>A brute force password attack is, essentially, a guessing game. Brute force attacks require hackers to run an immense number of character combinations until they finally guess the right code. With help from software, attackers can generate a previously unimaginable number of outcomes in a short period of time. To minimize the chance of success in case of a brute force attack, <a href=\"https:\/\/www.n-able.com\/blog\/how-to-build-password-policies-for-your-customers\" target=\"_blank\" rel=\"noopener\">consider utilizing passphrases rather than passwords<\/a>.<\/p>\n<h2><strong>Best practices for online password security<\/strong><\/h2>\n<p>For MSPs, knowing how to help prevent a password attack is a critical part of providing effective IT services. If an MSP has allowed a cyberattacker to slip through the cracks, they may quickly earn a reputation of being unskilled or untrustworthy. On the other hand, MSPs who know how to help prevent outside attacks can more easily maintain positive customer relationships.<\/p>\n<p>To stay one step ahead of cyberattackers, a reliable password management tool can go a long way. <a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\">N&#8209;able<sup>\u00ae<\/sup> Passportal<\/a> helps you generate strong passwords so you can help prevent brute force attacks, encrypt data to protect against malware, and <a href=\"\/use-cases\/automated-password-reset-tool\">rapidly reset passwords<\/a> to mitigate damage if hackers do gain access.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Passwords are the key to critical information, so protecting them from attackers is critical for any business. Find out how to secure them.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-44017","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Do Hackers Steal Passwords? - N-able<\/title>\n<meta name=\"description\" content=\"Passwords are the key to critical information, so protecting them from attackers is critical for any business. Find out how to secure them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Do Hackers Steal Passwords? - N-able\" \/>\n<meta property=\"og:description\" content=\"Passwords are the key to critical information, so protecting them from attackers is critical for any business. Find out how to secure them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-18T12:49:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T09:32:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/PP_How-Do-Hackers-Steal-Passwords_720x356-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/PP_How-Do-Hackers-Steal-Passwords_720x356-1.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"How Do Hackers Steal Passwords?\",\"datePublished\":\"2020-02-18T12:49:53+00:00\",\"dateModified\":\"2023-03-22T09:32:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords\"},\"wordCount\":819,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords\",\"name\":\"How Do Hackers Steal Passwords? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-02-18T12:49:53+00:00\",\"dateModified\":\"2023-03-22T09:32:29+00:00\",\"description\":\"Passwords are the key to critical information, so protecting them from attackers is critical for any business. Find out how to secure them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Do Hackers Steal Passwords?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Do Hackers Steal Passwords? - N-able","description":"Passwords are the key to critical information, so protecting them from attackers is critical for any business. Find out how to secure them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords","og_locale":"fr_FR","og_type":"article","og_title":"How Do Hackers Steal Passwords? - N-able","og_description":"Passwords are the key to critical information, so protecting them from attackers is critical for any business. Find out how to secure them.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-02-18T12:49:53+00:00","article_modified_time":"2023-03-22T09:32:29+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/PP_How-Do-Hackers-Steal-Passwords_720x356-1.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/PP_How-Do-Hackers-Steal-Passwords_720x356-1.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"How Do Hackers Steal Passwords?","datePublished":"2020-02-18T12:49:53+00:00","dateModified":"2023-03-22T09:32:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords"},"wordCount":819,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords","url":"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords","name":"How Do Hackers Steal Passwords? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-02-18T12:49:53+00:00","dateModified":"2023-03-22T09:32:29+00:00","description":"Passwords are the key to critical information, so protecting them from attackers is critical for any business. Find out how to secure them.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/how-do-hackers-steal-passwords#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"How Do Hackers Steal Passwords?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/44017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=44017"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/44017\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=44017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}