Based on findings from a Microsoft threat intelligence team, numerous technology and business outlets reported that Iranian hackers were targeting companies in the defense, satellite, and pharmaceutical sectors. According to
Below, learn what password spraying is, how it works, and why using a password manager can help protect against password spraying attacks.
What is password spraying?
In its
As noted above, password-spraying cyber criminals use the same password across many different accounts; chances are, they will successfully authenticate at least one account. They could come up short on 499 of 500 accounts, but if the 500th succeeds, they may hit pay dirt.
The process typically takes place in the following three common sequential steps:
Acquire list of usernames: Gaining a list of username accounts for an organization is often easier than it sounds. Most companies have a standardized, formal convention for emails that double as account usernames, such as firstname.lastname@company.com.
Begin spraying passwords: Locating a list of commonly used passwords is also extremely easy. Each year's top passwords can be found with a simple Google or Bing search and are even published on Wikipedia.
Gain account & system access: A common password often works against at least one account in the organization. If just one user isn’t following password best practices, the spraying attack will be successful.
Who is vulnerable to password spraying attacks?
While anyone can be vulnerable to password spraying attacks, organizations that manage and store large amounts of sensitive data are ideal targets because of the potentially substantial payoff. Unlike other types of cyber attacks that may run into enterprise-wide perimeter and network security resistance, password spraying is effective because it targets an IT security Achilles Heel: weak passwords/credentials.
The
The
Warning signs of a password spraying attack
One of the best steps to prevent users falling victim to password spraying attacks is proper detection. Here are three signs to look for that indicate systems and organizations may be in the midst of a password spraying attack:
Sudden spike in failed logins: Since password spraying covers so many accounts within an organization at once, a high number of failed login attempts within a short time span is one indication of password spraying.
High number of locked accounts: Password spraying avoids timeouts by waiting until the next login attempt. However, if you see an unusually high number of locked accounts this could be a clue that hackers have sprayed once, gotten locked out, and are waiting to try again soon.
Unknown or invalid user attempts: Hackers conducting password spraying aren’t likely to have a completely accurate list of username credentials. They’re either guessing or have purchased an outdated list online.
Can password spraying attacks be stopped?
While it’s probably impossible to prevent all successful password-spraying attacks, utilizing a password manager and two-factor authentication (2FA) can mitigate risk.
Password managers like Bitwarden are effective because they allow users to generate, save, and manage logins safely and securely, from anywhere on any device. They eliminate the need, and temptation, for password reuse by guarding against users defaulting to weak passwords because they make it easy for people to create unique usernames and passwords from any location or device. The stronger the password, the less likely cyber criminals are to crack it; if every password is unique, a single password compromise will remain siloed and won’t risk additional accounts. For more on creating strong passwords, check out the
Another method for creating even more safeguards around sensitive data is to utilize two-factor authentication (2FA). By
Employee cybersecurity awareness and training
Employee cybersecurity awareness and training are crucial in preventing password spraying attacks. Here are some tips to help employees stay safe:
Use strong and unique passwords: Employees should use strong and unique passwords for all accounts, and avoid using the same password across multiple accounts.
Enable multi-factor authentication: Employees should enable multi-factor authentication (MFA/2FA) whenever possible, to add an extra layer of security to their accounts.
Be cautious of phishing attacks: Employees should be cautious of phishing attacks, which are often used to steal login credentials.
Report suspicious activity: Employees should report any suspicious activity, such as multiple failed login attempts or unknown user attempts, to the IT department immediately.
By following these tips, employees can help prevent password spraying attacks and protect their organization’s sensitive data.
Get started with Bitwarden
Ready to experience the benefits of a password manager with Bitwarden? Quickly set up a