PASSWORDS DON'T MATTER ANYMORE
Attack
|
Also known as . . .
|
Frequency
|
Difficulty: Mechanism
|
User assists attacker by . . .
|
Does your password matter?
|
Credential Stuffing
|
Breach replay, list cleaning
|
Very high – 20+M accounts probed daily in MSFT ID systems
|
Very easy: Purchase creds gathered from breached sites with bad data at rest policies, test for matches on other systems. List cleaning tools are readily available.
|
Being human. Passwords are hard to think up. 62% of users admit reuse.
|
No – attacker has exact password.
|
Phishing
|
Man-in-the-middle, credential interception
|
Very high. 0.5% of all inbound mails.
|
Easy: Send emails that promise entertainment or threaten, and link user to doppelganger site for sign-in. Capture creds. Use Modlishka or similar tools to make this very easy.
|
Being human. People are curious or worried and ignore warning signs.
|
No – user gives the password to the attacker
|
Keystroke logging
|
Malware, sniffing
|
Low.
|
Medium: Malware records and transmits usernames and passwords entered, but usually everything else too, so attackers have to parse things.
|
Clicking links, running as administrator, not scanning for malware.
|
No – malware intercepts exactly what is typed.
|
Local discovery
|
Dumpster diving, physical recon, network scanning.
|
Low.
|
Difficult: Search user's office or journal for written passwords. Scan network for open shares. Scan for creds in code or maintenance scripts.
|
Writing passwords down (driven by complexity or lack of SSO); using passwords for non-attended accounts
|
No – exact password discovered.
|
Extortion
|
Blackmail, Insider threat
|
Very low. Cool in movies though.
|
Difficult: Threaten to harm or embarrass human account holder if credentials aren't provided.
|
Being human.
|
No – exact password disclosed
|
Password spray
|
Guessing, hammering, low-and-slow
|
Very high – accounts for at least 16% of attacks. Sometimes 100s of thousands broken per day. Millions probed daily.
|
Trivial: Use easily acquired user lists, attempt the same password over a very large number of usernames. Regulate speed and distributed across many IPs to avoid detection. Tools are readily and cheaply available. See below.
|
Being human.
Using common passwords such as qwerty123 or Summer2018!
|
No, unless it is in the handful of top passwords attackers are trying.
|
Brute force
|
Database extraction, cracking
|
Very low.
|
Varies: Penetrate network to extract files. Can be easy if target organization is weakly defended (e.g. password only admin accounts), more difficult if appropriate defenses of database, including physical and operation security, are in place. Perform hash cracking on password. Difficulty varies with encryption used. See below.
|
None.
|
No, unless you are using an unusable password (and therefore, a password manager) or a really creative passphrase. See below.
|