Watch out for Password Spraying Attacks…

by

August 13, 2019

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to Network Administrators regarding an increase in Password Spraying attacks.

What is a Password Spraying Attack?

Pretty much exactly what it sounds like. It’s a brute-force style attack where a would-be attacker literally sprays passwords at a user accounts until one sticks.

By using one password at a time across multiple accounts the attacker is usually able to remain undetected.

Typical Targets

Attackers go after a wide array of targets including, but not limited to:

  • Webmail
  • Remote Desktop Software
  • Active Directory Federated Services
  • Cloud Services (i.e. Office365)

What to Look For

  • A high number of authentication attempts within a set period of time
  • Large numbers of bad usernames
  • High number of account lockouts within a set period of time

How to Stop a Password Spraying Attack

  • Implement multifactor authentication
  • Use complex passwords
  • Implement a strong password reset policy
  • Increase alerting and monitoring

Like our blog? Subscribe using the CTA in the upper right hand corner of this page. Feel like sharing your thoughts with us? Use the comment section below.

Don’t forget to follow us on LinkedIn and Twitter

Carl Keyser is the Content Manager at Integris.

Keep reading

Strong Cybersecurity Postures: How to Unleash their Power

Strong Cybersecurity Postures: How to Unleash their Power

In the vast digital landscape where virtual dragons and sneaky trolls roam a strong cybersecurity posture has never been more important. Imagine a band of modern-day knights led by our protagonist, Alex. Armed with a trusty laptop and a cup of coffee, Alex navigates...

How to Spot a Phishing Attack in 2023

How to Spot a Phishing Attack in 2023

In 2023 cyber threats lurk behind every tree trunk in today's digital jungle, and cybersecurity awareness is more critical than ever. Among the craftiest of these threats are phishing attacks. Phishing attacks are cunningly engineered with social manipulation at their...

How to Choose an IT Consultant in Boulder, CO

Regardless of industry size or type, Boulder IT consultants play a massive role in the way companies in the Boulder area do business. While most companies may have their own in-house IT department, many of these departments are small and cannot handle all the...