Hackers don’t even bother brute-forcing long passwords, Microsoft researcher says


Security feed from CyberSecurity Help


Security researchers have long stressed the importance of using strong, alphanumeric passwords to protect users’ accounts on social media platforms, payment services, etc. According to the data collected by Microsoft’s network of honeypot servers, only few attacks target accounts protected by long passwords or passwords with special characters.

Most cybercriminals launch brute-force attacks to guess short passwords and might not even bother trying to guess a password if it is too long or complex, according Microsoft security researcher Ross Bevington.

“I analysed the credentials entered from over >25 million brute force attacks against SSH. This is around 30 days of data in Microsoft’s sensor network. 77% of attempts used a password between 1 and 7 characters. A password over 10 characters was only seen in 6% of cases” Bevington told the Record.

The researcher said that only 7% of the brute-force attempts he analyzed contained a special character, 39% had at least one number, and none used passwords that included white space.

Based on data from more than 14 billion brute-force attacks launched by hackers against Microsoft’s honeypot server network, attacks on Remote Desktop Protocol (RDP) servers have tripled since 2020 (up 325%), Bevington said. Additionally, researchers observed an increase in attacks against network printing services (178%), as well as Docker and Kubernetes systems, which saw an increase of 110%.

“By default solutions like RDP are turned off but if you decide to turn them on, don’t put stuff straight on the Internet. Remember that attackers will go after any brute forcible remote admin protocol. If you must have yours accessible on the Internet use strong passwords, managed identity, MFA,” Bevington said.

Adblock test (Why?)