Comments
Microsoft Office 365 Users Targeted in Brute Force Attacks
Newest First  |  Oldest First  |  Threaded View
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/24/2017 | 1:44:02 PM
Re: Password Policy
"... construct great combinations using these terms in totally unique ways"

This makes sense. They just need to use some special characters to make it complex.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/24/2017 | 1:42:47 PM
Re: Password Policy
HOBBIES?

I never heard that. Anything in dictionary does not need any brute force, it could be cracked in seconds.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/24/2017 | 1:41:10 PM
Re: Password Policy
"it is still difficult to perform a brute force because of the time"

That is true. Or just a complex password, it is still not easy to crack via brute force. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/24/2017 | 1:39:52 PM
Re: Password Policy
"This is where password policy becomes helpful"

That is true. Number of trials and locking for example.

 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
7/24/2017 | 1:37:49 PM
early this year?
 

Has this happened earlier this year and we are just hearing it. That is interesting. I wonder if any success out of those attacks.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
7/21/2017 | 9:14:02 AM
Re: Password Policy
When I was supporting small business and home users before moving to Georgia, my recommendation (still holds true) is for users to make passwords out of HOBBIES.  All of us have unique interests that we remember well and can construct great combinations using these terms in totally unique ways.  Very secure.
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
7/20/2017 | 11:25:25 PM
Password Policy
This is where password policy becomes helpful. Using a low and slow methodolgy will make it more likely to stay under the radar; but with enforced complexity, scheduled change, and lockout mechanisms it is still difficult to perform a brute force because of the time it would take to crack an account using this method.


What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Major International Airport System Access Sold for $10 on Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  7/11/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Cyberspace is much less secure than my old lamp.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14363
PUBLISHED: 2018-07-17
An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames.
CVE-2018-14349
PUBLISHED: 2018-07-17
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message.
CVE-2018-14350
PUBLISHED: 2018-07-17
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field.
CVE-2018-14351
PUBLISHED: 2018-07-17
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size.
CVE-2018-14352
PUBLISHED: 2018-07-17
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap_quote_string in imap/util.c does not leave room for quote characters, leading to a stack-based buffer overflow.