August 16, 2016 By Robert Lelewski 3 min read

Co-authored by Quinn North, Senior Incident Response Analyst, IBM Security.

Previously, we discussed the use of the feedback loop to help educate end users on how to improve secure computing practices. Here, we will discuss the feedback loop’s merits when applied to a regular part of an organization’s user auditing.

Weak Passwords Make for Weak Networks

End user auditing consists of ensuring security policies — such as password requirements — and due care is provided to sensitive documents.

Clients regularly ask IBM’s X-Force Incident Response team to scan their networks for intrusions, malicious activities or other risk factors. One such risk factor that we look for is the use of weak passwords. As countless security compromises have shown, weak passwords are a common root cause for the initial breach of a victim network.

Consider the results from three recent threat assessments where the clients asked us to examine the strengths of their passwords:

  • Of 3,000 user accounts scanned, 643 passwords were cracked (21 percent).
  • Of 10,777 user accounts scanned, 1,859 passwords were cracked (17 percent).
  • Of 3,086 user accounts scanned, 469 passwords were cracked (15 percent).

None of these user accounts were cracked over a period of weeks using a supercomputer with specialized software; all were cracked within 30 minutes on a generic laptop using free software.

Applying the Feedback Loop

One of the aforementioned organizations wisely decided to get serious about weak passwords within its environment after being presented with these findings. In addition to embracing technical controls that required strong passwords (e.g., passwords with minimum characters, numbers, special characters, etc.), the client also periodically attempted to crack its own passwords to identify weak ones that may still meet the complexity requirements. For example, p@ssw0rd, while it contains letters, numbers and a symbol, is still easy to guess since attackers would likely include it within a dictionary list used to crack passwords.

Using the four stages of the feedback loop, the client embarked on an aggressive campaign to suss out any deficient and risk-inducing passwords:

  1. Once a week, the organization collected the password hashes (which are required to crack a password) from the user accounts within its network.
  2. After applying a moderate level of effort to crack the passwords, the client discovered that approximately 20 percent of the passwords were still far too easy to crack.
  3. The employees with the easily crackable passwords didn’t receive a simple email stating their password was deficient. Rather, they were counseled on how their password was cracked with ease, educated on how to develop a secure password and asked to change their password. The interaction was personal and ensured that the message resonated with the employee.
  4. The client continued the process once every week and remeasured the behavior until the percentage of crackable passwords was reduced to the low single digits.

While some manpower is required to perform weekly gatherings of password hashes, this was essential to ensure that newly changed passwords were promptly gathered and recorded. Then users could be educated on their actions before too much time had elapsed.

Don’t Forget Service Accounts

These same methods should also be applied to service accounts, which are accounts that perform application functions with no user interaction. These accounts typically have elevated privileges to complete administrative tasks and are always an attractive target to attackers.

Often the default passwords are not changed or are changed to something that can be easily cracked. Additionally, some of these accounts may have been created prior to the adoption of a more stringent password policy and are thus grandfathered in with weak passwords. These accounts should not be overlooked during your password audit. However, because they are typically tied to running applications in a production environment, care should be taken when attempting to change them.

Regular auditing of user passwords while leveraging the feedback loop is a low-cost method to ensure end users don’t unintentionally introduce risk to your environment. It also helps develop a culture of security awareness and provide quantifiable data demonstrating improvement in security best practices over time.

Applying the feedback loop only helps to strengthen security and password initiatives. End users, when presented with timely information to correct their behavior, will serve as a force multiplier to your security posture.

More from Fraud Protection

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Remote access detection in 2023: Unmasking invisible fraud

3 min read - In the ever-evolving fraud landscape, fraudsters have shifted their tactics from using third-party devices to on-device fraud. Now, users face the rising threat of fraud involving remote access tools (RATs), while banks and fraud detection vendors struggle with new challenges in detecting this invisible threat. Let’s examine the modus operandi of fraudsters, prevalence rates across different regions, classic detection methods and Trusteer’s innovative approach to RAT detection through behavioral analysis. A rising threat As Fraud detection methods become more and…

Gozi strikes again, targeting banks, cryptocurrency and more

3 min read - In the world of cybercrime, malware plays a prominent role. One such malware, Gozi, emerged in 2006 as Gozi CRM, also known as CRM or Papras. Initially offered as a crime-as-a-service (CaaS) platform called 76Service, Gozi quickly gained notoriety for its advanced capabilities. Over time, Gozi underwent a significant transformation and became associated with other malware strains, such as Ursnif (Snifula) and Vawtrak/Neverquest. Now, in a recent campaign, Gozi has set its sights on banks, financial services and cryptocurrency platforms,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today