Attackers use automated tools to perform brute force attacks. These tools try combinations of usernames and passwords at high speed. The process involves:
Collecting a list of email addresses from various sources. Using password-cracking software to try different password combinations. Once the correct password is found, gaining unauthorized access to the email account.