
The constant attack of the Force Ford Force against millions confirmed.
Update, February 11, 2025: This story, originally published on February 9, has now been updated for the safest internet day with deep tips from security experts for the best password practices as well as a new credential analysis most used.
Hackers want your password. This is not very difficult to understand in the light of the fact that gaining access to accounts and equipment is the purpose of most cyber campaigns. The methods used to hacked your password should not be “the most sophisticated ever”, as seen in the latest Gmail attacks; There is often an easier and more efficient way to gain access to equipment and accounts that lead to further compromise: brutal force attack. It has now been confirmed that an attack with real Force Force Force Force is underway, and is using 2.8 million devices already compromised in an effort to make more compromise. Here’s what you need to know and do.
Explain the Hack Campaign of Force Force Brute
Heated on the heel of a FBI warning about the brutal force attacks against online cameras and digital video recorders, news of a much more worrying and widespread campaign of password hack. According to the Shadowserver Foundation, which describes itself as “a non -profit security organization that works altruistic behind scenes to make the internet safer for everyone”, a continuous Brute Force password has increased volume to 11 and is now using Up to 2.8 million devices compromised daily to alleviate attacks against Palo Alto Networks, Ivanti and Sonicwall network safety equipment such as VPN and Firewalls. A post by the Shadowserver X Foundation confirmed that there had been a “big increase in brutal internet access attacks against the first EDGE devices in our borrowings in the last few weeks”.
A spokesman for the Shadowserver Foundation told Bleeping Computer that “Attack IP addresses have spread to many networks and autonomous systems and is likely to have a botnet or any operation related to proxy residential networks.” In other words, cyber criminals are using an automated process that uses compromised customer accounts and equipment in order to facilitate such a massive Ford Hack’s brutal force attack.
Time time to become serious about your password
Darren James, an online security expert on the SPECOPS software, has provided credential tips aimed at mainly organizations, but which should be emphasized by everyone: it’s time to take passwords seriously. You may think that you are using strong, unbreakable, long, not just passwords because many pages now mandate passwords to meet often long and complex requirements. “However, this is not the case as many people are still not changing the predetermined password or using generic credentials, easy to make,” James said, “speaking clearly, most of us are guilty of using passwords lazy, or by reusing credentials at one point in our lives. “Although you analyze a database with more than a billion passwords that were compromised by Malware, it was discovered that a stunning 230 million filled the type of requirements Complexity so often located: more than eight characters, including the use of uppercase letters, numbers, numbers, and particular characters. “This shows that respecting standard password policies is only insufficient to protect against sophisticated attacks,” James warned.
The tips offered by James are mostly common sense in nature, which makes it more outrageous that so many organizations do not seem to be receiving attention. Please make sure you are not among them. Here’s what James recommended to do:
Train all employees in secure password practices by educating them on the type of password security risk they may encounter, such as the easy credentials to give them with poor storage. “After all,” James said, “We want to help users by providing detailed reactions, local language when they set up or change their passwords.” One way to do this is through the use of strong password policy that actually implements, James said. Encourage the use of longer phrases, which can be easier to remember as they use memorable words connected together, and avoid the risk of users increasing the same password by applying short expiration rules of the password. However, organizations must constantly check passwords and obviously require it to be changed if done is compromised. Brutal forces attacks are increasing at the moment, and to protect accounts you can apply jams after numerous failed entry efforts, blocking the IP addresses involved. “Configure these settings in Active Directory and other security systems,” advised James, “organizations can start by blocking easy passwords to be thought of being related to the company or business.” Something that is often overlooked is what happens with passwords when an employee leaves the organization. “When an employee leaves the company, immediately the inability of the accounts will prevent unauthorized entry,” James concluded, “Updating common passwords will also minimize security risks.”
What else do you have to do to protect your password
Customers and enterprises alike need to take steps to make sure they use strong and unique passwords for all accounts and equipment. However, this cannot be stressed enough; Even if your credentials are strong and unique, this does not mean that they are safe from password hackers.
That is why, at least, you need to make sure you are not reusing passwords through the account. A newly published analysis of the most used passwords, for example, found that the credentials that were made up of nothing, but the numbers calculated for the seven of the top ten “the most hacking passwords.” Daniel Pearson, CEO in Carnhhost, who conducted the analysis in question, advised, “criminals online are constantly evolving their tactics, but simple password hygiene may be the difference between protected stay and your details included in a violation of data.
With two-factor certification such as a second layer of compromise protection, your accounts will be safer than brutal password hackers, and all devices must be updated with the latest firmware as well as have all available security patches.