Let's consider what the statement "birthday paradox" means:
Def: Suppose the length of a digest is N. How many messages and relevant digests should be produced on the attacker side, in order to find two messages which have equal digests (collision happens) with the probability of finding these two messages is higher than 50%?
The answer is $ c*\sqrt{N} $. This means the attacker should collect at least $ c*\sqrt{N} $ number of messages among N messages in order to find two identical digests and find a collision. More clearly, in $ c*\sqrt{N} $ number of messages, there should be two messages m and $ \acute{m} $ that H(m) = H($ \acute{m}$) where the likelihood of finding these two messages is approximately 50% (which is an acceptable probability). In this formula, $c$ is a constant and it is approximately equal to 1.2 and ignored in most of the papers and calculations. Furthermore, this statistic is correct just for theoretical hash functions which are designed correctly and are flawless. In this case, we just find these two messages just by brute force and not any other attacks, as the hash function is flawless and designed based on pure theoretical mathematics.
If we want to give a simple example to clarify this, suppose U = {0,1} 128 is the length of digest, then the number of messages that the attacker should choose from U, in order to find two identical digests and find a collision( this incident have a the probability of almost 50%), should be :
$$ 1.2 * \sqrt{2^{128}} \cong 1.2 * (2^{64} ) \cong 2^{64} $$
This is an upper bound on collision resistance based on a proven mathematical probability paradox and it is correct just if the designed hash function is theoretically and mathematically correct. If we want to find collisions in the number of lower than $2^{64}$ messages, based on this theory, the probability reduces to less than 50%, in other words, it is less likely to find two messages with identical digests.
Now if I want to answer the question regarding " easier method than brute-force attack", this would happen if we could find a flaw in the design of the hash function that the attacker exploits in order to find two messages which they have identical digests in the lower number of $ c*\sqrt{N} $ messages. As I mentioned above, based on the birthday paradox, we should at least test the $ c*\sqrt{N} $ number of messages to find a collision ( in this number of tests, the probability of finding a collision is approximately equal to 50%). However, if there is a flaw in the design of the hash function, the attacker exploits that flaw and never uses brute force in order to find a collision. Moreover, here "easier method" is a type of attack that can be applied to hash functions rather than brute force attack.
The cryptographers, design their schemes based on computational security rather than perfect security; that is, they prove the security of their scheme based on computational powers. On the other hand, designed schemes without robust mathematical background which could not resist common theoretical attacks are not acceptable at all. Nowadays secure hash functions, are computationally resistant against common computational attacks as well as mathematically proven to be robust. In a theoretical way, it is possible to design a secure hash function, but in practice, there are many factors such as implementation that impact the designed scheme.