Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity
Medium
Analysis Summary
Password spraying attacks often goes unnoticed in the radar because of their low and slow approach. It is mostly because of not targeting a single account with multiple password guesses but multiple accounts to avoid lock outs and disabling the account. Attackers obtain lists of common passwords previously leaked and try them on multiple accounts.
Password spraying attacks have high success rate because of users using the common passwords. Research showed a significant amount of similarity between account passwords commonly used by people in organisations which touch a massive 75% and 87% passwords featured in the top 10,000 most commonly used passwords which makes it easier for the attackers to target users. These stats are clear signs of worry that reminds that common passwords are still a serious threat to data security today.
In 2019, Citrix confirmed the breach of their internal network which was most likely to be a password spraying attack. The attack went completely went unnoticed for five months and it most likely exploited weak passwords to gain access and downloaded business documents, which indicates that any organization even a tech savvy one can fall prey to weak password policy.
Impact
Credential theft
Remediation