Sunday, April 2, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • USENIX Security '22 - Johannes Wikner, Kaveh Razavi - ‘RETBLEED: Arbitrary Speculative Code Execution With Return Instructions’
  • What is the impact of AI on cyber security awareness?
  • Developer Roll Up: March 2023
  • FusionAuth announces Pass-wordle™
  • 3CX Supply Chain Attack Campaign
Security Bloggers Network 

Home » Security Bloggers Network » The Threat of Compromised Passwords

SBN

The Threat of Compromised Passwords

by Enzoic on June 9, 2020

Over time passwords have become a ubiquitous part of our digital activities. They’re something we expect to create and manage for all of our accounts, and yet with all of our online accounts, having unique passwords can be difficult. Despite this, they remain the most common way of locking unauthorized persons out of our systems and away from our sensitive data. The data held in our digital accounts is of great value to threat actors everywhere. This is why attackers are perfecting their techniques and using sophisticated tactics to conduct account takeover attacks using compromised passwords.

Compromised passwords pose a significant threat to the security of organizations and individuals and as time ticks on, the list of exposed passwords continues to grow at an alarming rate. In fact, according to the Verizon Data Breach report, 81% of hacking-related breaches leveraged either stolen and/or weak passwords.

TechStrong Con 2023Sponsorships Available

The Impact of Compromised Passwords

We’re currently experiencing a data breach epidemic. According to the 2019 MidYear QuickView Data Breach Report, 4.1 million records were compromised in the first six months of 2019. According to Help Net Security, in 2019, a total of 7,098 reported breaches exposed 15.1 billion records.

Compromised passwords are a crucial part of the data breach epidemic. One study found that 90% of respondents have experienced the effects of a data breach resulting from a compromised password. Compromised passwords impact both individuals and organizations, so in this section, we’ll be focusing on both to get a full picture of the true impact.

Reputation and Financial Loss

Threat Actors can potentially gain access to and the organization’s IT systems and steal sensitive data by utilizing compromised passwords. Even if they don’t use a compromised password to gain access to the system, they can often come away with many thousands or millions of these passwords after a successful data breach. This can have a significant impact on a company’s reputation and result in major financial loss, both in terms of fixing the damage and in the loss of future revenue.

The financial impact of a data breach due to compromised passwords can devastate companies of all sizes but can be particularly severe for small and medium-sized businesses (SMEs). SMEs are often less likely to have robust cybersecurity policies that protect against the use of already compromised passwords and they are also less likely to believe their company will be on the radar for Threat Actors. According to the IBM Cost of a Data Breach Report, the average total cost of a data breach globally is USD 3.92 million. However, the US is the most expensive country to have a data breach, where the average cost rises to USD 8.19 million.

Loss of Data

According to the same IBM report, 25,575 records on average are lost in a data breach. Once this data is out there it’s incredibly difficult (if not impossible) to regain control of it.

Recent Examples of Prominent Data Breaches Involving Exposed Passwords

  • In February 2018 Under Armour’s popular fitness app MyFitnessPal was breached, resulting in 150 million usernames, email addresses, and passwords being exposed.
  • In October 2016 the FriendFinder Network, a network dedicated to adult content and communication services was targeted by Threat Actors. In the attack, more than 412.2 million accounts were exposed and names, email addresses, and passwords were put in the hands of Threat Actors. The exposed passwords were protected using the notoriously weak SHA-1 hashing algorithm which meant that the vast majority of passwords were cracked in very little time.
  • In 2016, Uber was hit with a data breach that exposed over 57 million user and driver records. Threat Actors were able to gain access to these records by gaining access to Uber’s GitHub account, where they then found the username and password for Uber’s AWS account. So, in this case, according to CSO Online, a compromised password directly led to millions of user records being exposed.

The Growing Threat and Looking to The Future

While passwords remain a popular way of securing data, they are far from perfect.

“The password is by far the weakest link in cybersecurity today.” Michael Chertoff, former head of Homeland Security

This has led some security professionals to suggest other ways of securing our data, some of which are gaining traction. Fingerprint, Iris, or other biometric readers are becoming more common, as are persona-based authentication methods (relying on your online behavior and geographical location), and authentication keys. However, none of these options have managed to replace the traditional password and each comes with their own pros and cons.

Organizations cannot move away from the password anytime soon because of all the new authentication methods, the password is still the back-up factor and there is not a ubiquitously trusted alternative yet. This means we’re forced to come up with new and creative ways to defend our data while using passwords. Exposed password screening and compromised credential screening is starting to become more widely used due to its ability to alert users when their password has been exposed and is therefore no longer safe to use.

The post The Threat of Compromised Passwords appeared first on Enzoic.


Recent Articles By Author
  • How Azure AD Password Protection Identifies a “Bad” Password
  • Digital Spring Cleaning: Tips for a More Secure Active Directory
  • Five Cyber Trends to Watch For
More from Enzoic

*** This is a Security Bloggers Network syndicated blog from Enzoic authored by Enzoic. Read the original post at: https://www.enzoic.com/the-threat-of-compromised-passwords/

June 9, 2020June 9, 2020 Enzoic account takeover, Compromised Password Screening, credential screening, exposed passwords
  • ← COVID-19 Is Breeding More Cyberattacks: Here’s How to Contain Them
  • Web scammers are using the COVID-19 crisis to attack your customers with Magecart and other client-side exploits →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows
TSTV Podcast

Subscribe to our Newsletters

Most Read on the Boulevard

ChatGPT Less Convincing Than Human Social Engineers in Phishing Attacks
Should You Have Security Concerns When Partnering With a Third Party?
The Chasm Between Cybersecurity Confidence and Actual Ability
The Chip War’s Impact on Cybersecurity and the Supply Chain
Skyhawk Security Taps ChatGPT to Augment Threat Detection
How Ukraine’s Premier Electronics Retailer Ended Bot Attacks on its Digital Storefront
How the Dark Web is Embracing ChatGPT and Generative AI
Your Guide to The Top 15 Backend Languages For 2023
Debating SIEM in 2023, Part 2
ChatGPT Injection: a new type of API Abuse attack may steal your OpenAI API credits

Upcoming Webinars

Tue 04

Key Strategies for a Secure and Productive Hybrid Workforce

April 4 @ 1:00 pm - 2:00 pm
Wed 05

Securing Kubernetes With SentinelOne and AWS

April 5 @ 1:00 pm - 2:00 pm
Wed 05

From Vulnerable to Invincible: The Five-Step Journey to Complete Cloud Security

April 5 @ 3:00 pm - 4:00 pm
Wed 12

The State of Cloud-Native Security 2023

April 12 @ 1:00 pm - 2:00 pm
Thu 13

Case Study: Improving Code Security With Continuous Software Modernization

April 13 @ 11:00 am - 12:00 pm
Thu 20

Lessons From a Live Hack: Secure Your Cloud From the Inside

April 20 @ 3:00 pm - 4:00 pm
Mon 24

Securing Open Source

April 24 @ 1:00 pm - 2:00 pm
May 03

Top Phishing Trends and How to Stop Phishing Attacks

May 3 @ 1:00 pm - 2:00 pm
May 03

https://webinars.securityboulevard.com/ciso-panel-tips-for-optimizing-cloud-native-security-stack-in-2023?utm_campaign=2023.05.03_Aqua_Webinar_SB&utm_source=BMRegister

May 3 @ 3:00 pm - 4:00 pm
May 22

Ransomware

May 22 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?
Analytics & Intelligence API Security Application Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

FINALLY! FCC Acts on SMS Scam-Spam — But Will It Work?

March 17, 2023 Richi Jennings | Mar 17 0
White House to Regulate Cloud Security: Good Luck With That
Analytics & Intelligence Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Software Supply Chain Security Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

White House to Regulate Cloud Security: Good Luck With That

March 13, 2023 Richi Jennings | Mar 13 0
‘Extraordinary, Egregious’ Data Breach at House and Senate
Analytics & Intelligence API Security Application Security CISO Suite Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Ransomware Securing Open Source Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Extraordinary, Egregious’ Data Breach at House and Senate

March 10, 2023 Richi Jennings | Mar 10 0

Top Stories

Noname Security Extends Reach of API Security Platform
Application Security Cybersecurity Featured News Security Boulevard (Original) Spotlight Vulnerabilities 

Noname Security Extends Reach of API Security Platform

March 31, 2023 Michael Vizard | 1 day ago 0
Elastic Unfurls Cloud Security Platform for AWS
Cloud Security Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight 

Elastic Unfurls Cloud Security Platform for AWS

March 31, 2023 Michael Vizard | 1 day ago 0
Twitter Presses GitHub to Turn Over User Who Leaked Source Code
Cloud Security Cybersecurity Data Security Featured Incident Response Malware News Security Boulevard (Original) Social Engineering Spotlight Vulnerabilities 

Twitter Presses GitHub to Turn Over User Who Leaked Source Code

March 31, 2023 Teri Robinson | 1 day ago 0

Security Humor

Randall Munroe’s XKCD ‘Qualifications’

Randall Munroe’s XKCD ‘Qualifications’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.