The Specops research team analyzed 15 million passwords used in live attacks against RDP ports, revealing that simple, predictable passwords continue to be exploited by threat actors targeting remote access points. “An end user who had chosen a complex password, even a short basic one, would have been protected against more than 92% of the passwords being used in these RDP port attacks,” noted the research team. This research demonstrates that despite years of security awareness training, users and organizations continue to implement weak passwords that are easily targeted by hackers. The research coincided with Specops adding over 85 million compromised passwords sourced from honeypot networks and threat intelligence operations to its Breached Password Protection service. Organizations must recognize that simple complexity requirements are insufficient; password length combined with robust authentication protocols provides the most effective defense against the ongoing wave of RDP-targeted attacks. “If your organization was enforcing passphrases of over 15 characters, your end users would be protected against 98% of the passwords being used in the attack,” the researchers concluded. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 02 Apr 2025 12:50:12 +0000