Blog Ransomware attacks: Change your weak passwords
Ransomware remains a massive threat to businesses of all sizes, in 2018 83% of Managed Service Providers reported ransomware attacks against their clients with the number and frequency of incidents increasing year over year since 2016. A lack of cybersecurity education and weak passwords are the leading cause of successful ransomware attacks. In recent years ransomware attacks relied on phishing emails and spam as the initial infection vector. In the past months, attackers have started shifting to brute-force attacks, which now account for 31% of attack attempts. With ransomware having such a crippling effect on business both in operational downtime and cost, preventing attacks should be a key area of focus.
Brute force attacks are attacks where hackers attempt to access systems and services by inputting as many passwords as possible. These attacks are typically automated and allow multiple simultaneous login attempts. Recent studies show that Canada has some of the highest security incident costs in the world, the average ransom price is $13,000, and the average downtime loss is $65,000. Losing a significant amount of money because personnel use passwords such as “123456” or “Summer2019” is extremely painful. Frequently Packetlabs identifies weak passwords used within organizations, default credentials and credentials re-used across multiple accounts, including administrative accounts. Organizations need to take time to ensure their password policies mandate strong passwords and maintain them over time.
2019 Password Policy Considerations:
Minimum length of 10 characters.
Avoid using passwords and use passphrases, such as a short sentence.
The longer the password, the better. Complexity helps but length is significantly more critical.
Complexity: at least 1 number, one upper and one lower case letter, one special character.
Never re-use a password across multiple accounts, especially privileged users such as IT and finance roles.
All it takes is one user to have weak or compromised credentials for an organization to fall victim to successful cyber-attacks. Following a disaster, 90% of small businesses fail within a year if operations do not resume within five days, and 60% of small business fail after a disaster. In addition, to secure passwords having multi-factor authentication for internet facing logins, it is recommended as part of a holistic approach to implement access controls. Services like VPN and email should require a second factor for authentication, in the event a user’s account is compromised an attacker from across the world won’t be able to log in.
Authentication processes involve three factors of authentication:
Something you know (e.g., a username and password)
Something you have (e.g., a token generator or mobile device with authenticator app)
Something you are (e.g., fingerprint)
Most authentication processes will utilize “something you have” for a second factor, and commonly use a mobile authenticator or token generator. Mobile authenticator applications are low cost to implement and often free to install on the user’s mobile device. The most popular email service providers support various mobile authenticators out of the box at no or little additional cost.
Countless organizations are looking into cyber insurance to aid with the financial impact of being hit with ransomware in the interim. In the long run, preventing ransomware through a healthy security posture is the wise approach, overtime attackers evolve and innovate and are primarily motivated by financial interests. Your businesses security should strive to be ahead of attackers and ready to adapt as the threat landscape changes.
Penetration testing is a valuable investment to ensure your business is not vulnerable to cyber-attacks, which can threaten your business. Companies of all sizes are subject to attacks, and identifying weaknesses will help prioritize security efforts and improve budget efficiencies. If you’re looking for additional information about how a penetration test can help, start a conversation with our team today.
Featured Posts

July 28 - Blog
7 Free and Open Source Tools for Binary Diffing
Reverse engineers rely on binary diffing for malware and vulnerability analysis and more. Here are 7 open-source tools that offer advanced capabilities for analyzing code-level changes in binary executables.

July 16 - Blog
Loader Malware and its Role in the Cyberattack Lifecycle
Loader malware plays a critical role in the middle stages of the cyber attack lifecycle. Explore how attackers use it to import various types of malware in the attacker's environment while evading detection.

July 15 - Blog
The OSI Model's Seven Layers of Cyberattack
Learn the OSI conceptual model and its seven layers to better understand network communications, and plan defensive security operations such as penetration testing campaigns, and threat modelling.