ARTICLE AD BOX
Weak passwords proceed to beryllium a awesome vulnerability for FTP servers. Specops’ latest study highlights nan astir predominant passwords utilized successful attacks and offers proposal connected amended password policies.
Cybersecurity researchers astatine Specops person precocious analysed nan passwords being utilized by cyber attackers to effort and break into FTP (File Transfer Protocol) servers complete nan past month. Their research, shared pinch Hackread.com, reveals that attackers proceed to heavy trust connected easy guessable passwords, contempt nan readiness of much blase hacking techniques, highlighting nan request for stronger password policies to protect networks.
The Specops squad researched unrecorded attacks happening against existent networks and identified nan astir predominant passwords utilized successful these brute-force attempts, which mention to many times trying different combinations of usernames/passwords to find nan correct one. This investigation was done astir nan aforesaid clip that Specops added complete 133 cardinal compromised passwords to their “Breached Password Protection” service.
The study examined attacks targeting FTP’s TCP larboard 21, a communal introduction constituent owed to its often anemic security. The apical 3 astir often utilized passwords were “admin” (used 907 times), “root” (896 times), and “123456” (854 times). Other often tried passwords included elemental ones for illustration “password,” “admin123,” and keyboard patterns for illustration “qwerty.” This highlights a persistent nonaccomplishment by galore users to alteration default credentials aliases take beardown passwords.
A important uncovering was nan simplicity of nan passwords: 54% of nan attempted passwords contained only numbers aliases lowercase letters, while a specified 1.6% utilized a operation of uppercase, lowercase, numbers, and typical characters.


This shows that a password argumentation requiring astatine slightest 1 of each of these characteristic types would artifact almost 99% of nan passwords hackers are presently utilizing against FTP servers.
Finally, researchers examined nan magnitude of nan passwords utilized successful attacks and identified that a majority, 87.4%, were betwixt 6 and 10 characters long. This supports nan latest recommendations from NIST (National Institute of Standards and Technology), which propose prioritizing longer passwords aliases passphrases (over 15 characters) pinch immoderate complexity, arsenic these are overmuch harder to ace done brute force.
They besides contrasted these FTP attacks pinch those targeting RDP (Remote Desktop Protocol) larboard 3389, noting that RDP’s encryption and information features make elemental password guessing little effective. FTP, often transmitting credentials unencrypted, hence remains a premier target for attackers aiming to bargain files aliases works malicious software.
Marcus White from nan Specops squad explained that knowing nan passwords attackers are utilizing tin thief organizations create amended password rules and take sides against these brute-force attacks.
In conclusion, nan Specops squad recommends that organizations should enforce policies that artifact anemic password choices and promote nan usage of passphrases longer than 15 characters pinch immoderate complexity.