Browse Classifications
- All Resources
- Strategic Content
- Technical Content
- Ahead of the Breach Podcast Content
- Partner Program Content
Learn about the password spraying threat to self-hosted services.
Passwords are one of the most significant weaknesses in companies’ cybersecurity defenses. In theory, passwords protect access to corporate systems and resources because they are a long, random string of characters known only to the authorized user.
In reality, most user passwords are weak and easily guessable. In fact, password is the most common password — used by millions of people — and many of the most common passwords can be cracked by an attacker in less than a second.
In a password spraying attack, attackers take advantage of these weak and reused passwords by “spraying” them at an authentication portal. For many corporate accounts, the username is an email address or some variant, making it easy to determine valid usernames on a system. By attempting to log into a corporate system using valid usernames and a list of common passwords, the attackers bet on identifying an account protected by a weak or reused password.
Password spraying attacks are a common technique because they work. In our penetration testing engagements, we rarely find that an attack targeting weak credentials fails to provide access to at least one legitimate employee account.
As companies move to the cloud, they receive a certain level of protection against password spraying and similar attacks. For cloud-hosted services such as Office 365 and Microsoft Azure, Microsoft identifies and blocks attempted password spraying attacks. As a result, companies may believe that their Microsoft solutions are immune to the threat.
However, many businesses also have legacy Microsoft authentication portals, such as Skype for Business or Microsoft Exchange. Often, these portals are hosted on company-managed infrastructure rather than in the cloud.
These self-hosted authentication portals lack the same protection as their cloud-based counterparts. As a result, they are an ideal target for cybercriminals performing a credential stuffing attack.
A successful password spraying attack results in the attacker gaining access to a legitimate user account. This access can be used in a variety of different ways, including:
These are only a few examples of how an attacker can take advantage of access to a compromised employee account. With a user’s password, an attacker can theoretically perform any action or access any system that the account’s owner can.
Password spraying is a common attack vector because it is easy to perform and works well. Some ways that companies can reduce their exposure to password spraying attacks include the following:
Password spraying attacks commonly target APIs and authentication portals that make it easy to automate logins. These portals may also be less visible to an organization, making it easier for them to be overlooked and forgotten.
Pentration testing provides companies with a means to identify these vulnerabilities and assess their risk to the organization. Pen test engagements commonly include scans for unsecured authentication mechanisms and user accounts with weak passwords that can be easily guessed or cracked.
Sprocket Security offers continuous penetration testing that provides companies with visibility into their evolving cyber risk exposure. A combination of human and automated penetration testing can help expose password spraying risks and other threats to corporate cybersecurity. Learn more by requesting a free quote today.
Continuous Human & Automated Security
Continuously monitor your attack surface with advanced change detection. Upon change, testers and systems perform security testing. You are alerted and assisted in remediation efforts all contained in a single security application, the Sprocket Platform.