Foo Fighters & Pearl Jam Mentioned In Stunning Scandal

9
308

There has been a vast number of internet hacking scandals in recent years, and people’s fandom of rock and roll bands appears to have played a role in it. A list of the top 100,000 most vulnerable passwords have been released, and it features famous rockers like Foo Fighters, Pearl Jam, Metallica, Green Day, Slipknot, Nirvana, Sum 41, and Iron Maiden. NCSC released a ‘global password risk list’ created by the UK’s National Cyber Security Centre.

Blink-182 are the most vulnerable password for a music act. Blink-182 singer/bassist Mark Hoppus wrote “You guys”, and shared a CNN link to the list.

NCSC wrote, “Password re-use is still a major risk for individuals and companies. The password ‘123456’ has been found 23 million times in the breaches that Troy’s collected. You might think that choosing a more complex password such as ‘oreocookie’ is better, but even that has been seen over 3,000 times.

Attackers commonly use lists like these when attempting to breach a perimeter, or when trying to move within a network to potentially less well defended systems. It’s especially common in networks where there’s a corporate component and an operational or Industrial Control System (ICS) component. In such deployments, attackers have been able to breach the corporate network and move laterally to the internal network due to poor network segmentation, where a single weak point (such as a password from one of these lists on a box in a DMZ) has enabled traversal. In the first occurrence of the TRITON/TRISIS malware, the attacker breached the external perimeter VPN and then pivoted internally using RDP due to poor segmentation.

While in this case it’s unknown how the perimeter VPN credentials were obtained, by using a modern approach to authentication (including the use of multi-factor authentication), you can reduce the risk of intrusion into your networks from an attacker taking advantage of breached data, poor password choices, or lack of strong authentication methods.”