More than 40,000 of over 1.8 million administrator credentials compromised by information-stealing malware that have been recovered from January to September were "admin," indicating the prevalence of weak passwords used in administrator portals and the elevated vulnerability of enterprise networks to cyberattacks, reports BleepingComputer.
Rounding out the ten weakest authentication credentials were "123456," "12345678," "1234," "Password," "123," "12345," "admin123," "123456789," and "adminisp," an Outpost24 report revealed.
"Most of the passwords in our list could have been easily guessed in a rather unsophisticated password-guessing attack," said Outpost24 researchers.
With admin portals commonly enabling configuration, account, and security setting access, as well as database operations management, organizations have been urged to implement robust and unique passwords across all accounts.
Organizations should also adopt endpoint and detection response solutions, while ensuring the deactivation of browser-based password saving and auto-fill options, preventing cracked software usage, and implementing domain checking for redirections, according to Outpost24.
Decentralized identity and verifiable credentials, Endpoint/Device Security, Security Staff Acquisition & Development
Weak passwords prevalent in admin portals
Share
Related Terms
Access MatrixBring Your Own Device (BYOD)Certificate-Based AuthenticationDigital CertificateDiscretionary Access Control (DAC)Endpoint SecurityEphemeral PortExtranetKeyloggerRegistryGet daily email updates
SC Media's daily must-read of the most current and pressing daily news