Weak passwords proceed to be a significant vulnerability for FTP servers. Specops’ newest report highlights essentially the most frequent passwords utilized in assaults and presents recommendation on higher password insurance policies.
Cybersecurity researchers at Specops have just lately analysed the passwords being utilized by cyber attackers to attempt to break into FTP (File Switch Protocol) servers over the previous month. Their analysis, shared with Hackread.com, reveals that attackers proceed to closely depend on simply guessable passwords, regardless of the provision of extra subtle hacking methods, highlighting the necessity for stronger password insurance policies to guard networks.
The Specops group researched dwell assaults occurring in opposition to actual networks and recognized essentially the most frequent passwords utilized in these brute-force makes an attempt, which discuss with repeatedly making an attempt totally different mixtures of usernames/passwords to search out the right one. This analysis was carried out across the similar time that Specops added over 133 million compromised passwords to their “Breached Password Safety” service.
The research examined assaults focusing on FTP’s TCP port 21, a typical entry level because of its usually weak safety. The highest three most continuously used passwords have been “admin” (used 907 instances), “root” (896 instances), and “123456” (854 instances). Different continuously tried passwords included easy ones like “password,” “admin123,” and keyboard patterns like “qwerty.” This highlights a persistent failure by many customers to alter default credentials or select robust passwords.
A major discovering was the simplicity of the passwords: 54% of the tried passwords contained solely numbers or lowercase letters, whereas a mere 1.6% used a mixture of uppercase, lowercase, numbers, and particular characters.

This reveals {that a} password coverage requiring a minimum of one in all every of those character varieties would block virtually 99% of the passwords hackers are presently utilizing in opposition to FTP servers.
Lastly, researchers examined the size of the passwords utilized in assaults and recognized {that a} majority, 87.4%, have been between 6 and 10 characters lengthy. This helps the newest suggestions from NIST (Nationwide Institute of Requirements and Know-how), which counsel prioritizing longer passwords or passphrases (over 15 characters) with some complexity, as these are a lot more durable to crack by means of brute drive.
Additionally they contrasted these FTP assaults with these focusing on RDP (Distant Desktop Protocol) port 3389, noting that RDP’s encryption and security measures make easy password guessing much less efficient. FTP, usually transmitting credentials unencrypted, therefore stays a main goal for attackers aiming to steal information or plant malicious software program.
Marcus White from the Specops group defined that figuring out the passwords attackers are utilizing will help organizations create higher password guidelines and defend in opposition to these brute-force assaults.
In conclusion, the Specops group recommends that organizations ought to implement insurance policies that block weak password selections and encourage using passphrases longer than 15 characters with some complexity.