All it takes is a few weak passwords for hackers to gain access to sensitive data. Photo: Dan Nelson / Unsplash
All it takes is a few weak passwords for hackers to gain access to sensitive data. Photo: Dan Nelson / Unsplash
All it takes is a few weak passwords for hackers to gain access to sensitive data. Photo: Dan Nelson / Unsplash
All it takes is a few weak passwords for hackers to gain access to sensitive data. Photo: Dan Nelson / Unsplash

How weak computer passwords can threaten national security


  • English
  • Arabic

Passwords are a weak form of protection and complacency runs high. We might not think that we, as individuals, would be unlucky enough to be targeted by hackers, or that we’re worth hacking at all. But that complacency extends from smartphone-toting citizens right up to government contractors and employees of multinational corporations.

This week, Microsoft said it had seen a surge in activity from a suspected state-sponsored group of hackers, thought to be Iranian, targeting companies in the Middle East working in defence, fossil fuels and maritime transportation. Its strategy? Guessing the passwords of Microsoft Office 365 users. Its success rate? Of more than 250 targets, fewer than 20 systems were compromised. The spoils? Data such as shipping plans, logs and satellite imagery, which, Microsoft says, could assist with Iran’s developing satellite programme.

It wasn’t a sophisticated attack, but it was an effective one. Microsoft says it used a freely available research tool to blast a series of commonly used passwords at vulnerable systems. Known as “password-spraying”, the technique is more about brute force than subtlety, but any large organisation will inevitably have a small number of systems protected by weak passwords, and these provide an incredibly convenient point of entry.

A survey conducted earlier this year by software firm Keeper Security found that more than a third of employees have incorporated their company's name into a new work-related password. The company also reported high usage of family names or birth dates. For state-sponsored hackers with a wealth of tools at their disposal, accounts secured in this way are the lowest of low-hanging fruit.

On October 7, Microsoft said Russia accounted for most state-sponsored hacking, with a 58 per cent share of intrusion attempts it detected in the past year. AP Photo
On October 7, Microsoft said Russia accounted for most state-sponsored hacking, with a 58 per cent share of intrusion attempts it detected in the past year. AP Photo

Such hackers are known as APTs, or “advanced persistent threats”, and security monitoring groups give them codes to match. The North Korean APT38, for example, also known as the Lazarus Group or Zinc, has achieved a number of successful, high-profile attacks – including a crippling one on Sony Pictures – going back as far as 2009. Their aims and strategies are self-evident: they have specific objectives to disrupt, steal or observe – usually for political or economic ends – and crucially they have the skills, time and resources to succeed.

Proving that nation states are behind APTs and their attacks is difficult; the origin of a single cyber attack is hard to detect and responsibility for it is easy to deny. But the label “state-sponsored” can cover a multitude of different involvements - some hacker groups may be tightly integrated within government departments, while others could be third parties to which governments choose to turn a blind eye because their aims happen to align very neatly. The current world leader in hacking is, according to Microsoft, Russia, as it says 58 per cent of attacks from July 2020 to June 2021 originated there, with North Korea second (23 per cent) and Iran third (11 per cent). The US and Ukraine were the most besieged by cyber attacks, receiving 46 per cent and 19 per cent, respectively.

The coronavirus pandemic has seen an escalation in nefarious activity, with Google reporting bad actors using 'Covid-related themes' to attack US government employees

The recent breach of a handful of systems via Microsoft Office would seem, on the face of it, to be a comparatively minor incident. But the past decade has demonstrated the potential that state-sponsored hackers have to wreak havoc. In 2017, the so-called “WannaCry” attack, thought to have originated in North Korea, caused huge disruption to health services in the US and the UK, along with Russian banks and corporations including Nissan. In 2018, hackers in Russia conducted a mass cyber-campaign against home routers and ISPs around the world, with weak passwords again providing them with easy pickings. In 2017, Iran was suspected of a malware attack that caused infrastructure systems in Saudi Arabia to be shut down. Connectivity has brought with it vulnerability.

The coronavirus pandemic has sparked an escalation in nefarious activity, with Google reporting bad actors using “Covid-related themes” to attack US government employees through phishing scams (including posing as fast-food outlets), while Microsoft reported a Russian hacking group called Strontium (APT28) using password-spraying in an attempt to infiltrate medical agencies working on a vaccine.

Crucially, if a weak password gives hackers a foothold, it may be possible for them to gain privileges to access other systems within the organisation. In July, the US government, in response to the rising incidence of malicious cyber activity, offered rewards of up to $10 million for information that would help authorities track down those responsible.

Multimillion-dollar rewards may well help in the fight against these attacks, but Microsoft and Google are also working with companies to prevent something as critical as national security hanging on something as threadbare as a weak password. Microsoft is urging greater use of two-factor authentication (where an extra pass key is required alongside a password) or, more preferably, sign-in methods that don’t use passwords at all. It has recently encouraged wider use of an app, Microsoft Authenticator, which signs in neatly with bolstered security. This week, Google provided 10,000 users deemed at high risk of state-sponsored attacks (activists, journalists, government employees), with free USB security keys to replace their passwords altogether.

Step-ups in security, of course, merely prompt hackers to become more ingenious. Some dispute the validity of the term “cyber warfare”, given that the cyberattacks have neither the scale nor the brutality of actual war. But both sides are mustering all their resources, and the battle – as we are seeing – is undoubtedly real.

MATCH INFO

Uefa Champions League last-16, second leg:

Real Madrid 1 (Asensio 70'), Ajax 4 (Ziyech 7', Neres 18', Tadic 62', Schone 72')

Ajax win 5-3 on aggregate

Tu%20Jhoothi%20Main%20Makkaar%20
%3Cp%3E%3Cstrong%3EDirector%3A%20%3C%2Fstrong%3ELuv%20Ranjan%26nbsp%3B%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStars%3A%20%3C%2Fstrong%3ERanbir%20Kapoor%2C%20Shraddha%20Kapoor%2C%20Anubhav%20Singh%20Bassi%20and%20Dimple%20Kapadia%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%203%2F5%3C%2Fp%3E%0A
COMPANY%20PROFILE
%3Cp%3E%3Cstrong%3ECompany%3A%20%3C%2Fstrong%3EEducatly%3Cbr%3E%3Cstrong%3EStarted%3A%20%3C%2Fstrong%3E2020%3Cbr%3E%3Cstrong%3EBased%3A%20%3C%2Fstrong%3EUAE%3Cbr%3E%3Cstrong%3EFounders%3A%20%3C%2Fstrong%3EMohmmed%20El%20Sonbaty%2C%20Joan%20Manuel%20and%20Abdelrahman%20Ayman%3Cbr%3E%3Cstrong%3EIndustry%3A%20%3C%2Fstrong%3EEducation%20technology%3Cbr%3E%3Cstrong%3EFunding%20size%3A%20%3C%2Fstrong%3E%242%20million%3Cbr%3E%3Cstrong%3EInvestors%3A%20%3C%2Fstrong%3EEnterprise%20Ireland%2C%20Egypt%20venture%2C%20Plus%20VC%2C%20HBAN%2C%20Falak%20Startups%3C%2Fp%3E%0A
From Zero

Artist: Linkin Park

Label: Warner Records

Number of tracks: 11

Rating: 4/5

While you're here
Nepotism is the name of the game

Salman Khan’s father, Salim Khan, is one of Bollywood’s most legendary screenwriters. Through his partnership with co-writer Javed Akhtar, Salim is credited with having paved the path for the Indian film industry’s blockbuster format in the 1970s. Something his son now rules the roost of. More importantly, the Salim-Javed duo also created the persona of the “angry young man” for Bollywood megastar Amitabh Bachchan in the 1970s, reflecting the angst of the average Indian. In choosing to be the ordinary man’s “hero” as opposed to a thespian in new Bollywood, Salman Khan remains tightly linked to his father’s oeuvre. Thanks dad. 

Fifa%20World%20Cup%20Qatar%202022%20
%3Cp%3E%3Cstrong%3EFirst%20match%3A%20%3C%2Fstrong%3ENovember%2020%0D%3Cbr%3E%3Cstrong%3EFinal%2016%20round%3A%20%3C%2Fstrong%3EDecember%203%20to%206%0D%3Cbr%3E%3Cstrong%3EQuarter-finals%3A%20%3C%2Fstrong%3EDecember%209%20and%2010%0D%3Cbr%3E%3Cstrong%3ESemi-finals%3A%20%3C%2Fstrong%3EDecember%2013%20and%2014%0D%3Cbr%3E%3Cstrong%3EFinal%3A%20%3C%2Fstrong%3EDecember%2018%3C%2Fp%3E%0A
Groom and Two Brides

Director: Elie Semaan

Starring: Abdullah Boushehri, Laila Abdallah, Lulwa Almulla

Rating: 3/5

UAE%20SQUAD
%3Cp%3E%0D%3Cstrong%3EMen%3A%3C%2Fstrong%3E%20Saif%20Al%20Zaabi%2C%20Salem%20Al%20Marzooqi%2C%20Zayed%20Al%20Ansaari%2C%20Saud%20Abdulaziz%20Rahmatalla%2C%20Adel%20Shanbih%2C%20Ahmed%20Khamis%20Al%20Blooshi%2C%20Abdalla%20Al%20Naqbi%2C%20Khaled%20Al%20Hammadi%2C%20Mohammed%20Khamis%20Khalaf%2C%20Mohammad%20Fahad%2C%20Abdulla%20Al%20Arimi.%0D%3Cbr%3E%3Cstrong%3EWomen%3A%3C%2Fstrong%3E%20Mozah%20Al%20Zeyoudi%2C%20Haifa%20Al%20Naqbi%2C%20Ayesha%20Al%20Mutaiwei.%3C%2Fp%3E%0A
THE BIO

Age: 30

Favourite book: The Power of Habit

Favourite quote: "The world is full of good people, if you cannot find one, be one"

Favourite exercise: The snatch

Favourite colour: Blue

MATCH INFO

Uefa Champions League semi-finals, first leg
Liverpool v Roma

When: April 24, 10.45pm kick-off (UAE)
Where: Anfield, Liverpool
Live: BeIN Sports HD
Second leg: May 2, Stadio Olimpico, Rome

Fight Night

FIGHT NIGHT

Four title fights:

Amir Khan v Billy Dib - WBC International title
Hughie Fury v Samuel Peter - Heavyweight co-main event  
Dave Penalosa v Lerato Dlamini - WBC Silver title
Prince Patel v Michell Banquiz - IBO World title

Six undercard bouts:

Michael Hennessy Jr v Abdul Julaidan Fatah
Amandeep Singh v Shakhobidin Zoirov
Zuhayr Al Qahtani v Farhad Hazratzada
Lolito Sonsona v Isack Junior
Rodrigo Caraballo v Sajid Abid
Ali Kiydin v Hemi Ahio

Asia Cup Qualifier

Final
UAE v Hong Kong

Live on OSN Cricket HD. Coverage starts at 5.30am

Panipat

Director Ashutosh Gowariker

Produced Ashutosh Gowariker, Rohit Shelatkar, Reliance Entertainment

Cast Arjun Kapoor, Sanjay Dutt, Kriti Sanon, Mohnish Behl, Padmini Kolhapure, Zeenat Aman

Rating 3 /stars

Fitness problems in men's tennis

Andy Murray - hip

Novak Djokovic - elbow

Roger Federer - back

Stan Wawrinka - knee

Kei Nishikori - wrist

Marin Cilic - adductor

%3Cp%3EThe%20Department%20of%20Culture%20and%20Tourism%20-%20Abu%20Dhabi%E2%80%99s%20Arabic%20Language%20Centre%20will%20mark%20International%20Women%E2%80%99s%20Day%20at%20the%20Bologna%20Children's%20Book%20Fair%20with%20the%20Abu%20Dhabi%20Translation%20Conference.%20Prolific%20Emirati%20author%20Noora%20Al%20Shammari%2C%20who%20has%20written%20eight%20books%20that%20%20feature%20in%20the%20Ministry%20of%20Education's%20curriculum%2C%20will%20appear%20in%20a%20session%20on%20Wednesday%20to%20discuss%20the%20challenges%20women%20face%20in%20getting%20their%20works%20translated.%3C%2Fp%3E%0A
Volvo ES90 Specs

Engine: Electric single motor (96kW), twin motor (106kW) and twin motor performance (106kW)

Power: 333hp, 449hp, 680hp

Torque: 480Nm, 670Nm, 870Nm

On sale: Later in 2025 or early 2026, depending on region

Price: Exact regional pricing TBA

Updated: October 13, 2021, 1:07 PM