Blog article

Password attacks: when 'admin123' is an open invitation

Article 4 from the series "It’s a jungle out there: Navigating the digital danger zone"

Password attacks are among the oldest and still most effective forms of cyber threats. These attacks rely on a combination of social engineering and automated techniques to gain unauthorized access by compromising user credentials.

How it works: Attackers use methods such as brute force attacks (systematically trying every possible character combination) or dictionary attacks, where thousands of commonly used passwords are tested from a precompiled list. As soon as a user relies on a simple or predictable password, the door is wide open.

Why it’s dangerous: A weak or reused password might be the only barrier standing between an attacker and a ship’s entire communications platform or the shoreside IT system. One compromised access point can lead to full access to navigation systems, sensors, communications, and critical operational data.

Realworld examples:

  • An ECDIS system administrator leaves the default password in place, attackers log in without resistance.
  • A former crew member uses an old account to access the ship’s internet connection.
  • The same password is used for email, CRM, and the SCADA interface.

How to protect against it:

  • Enforce strong, complex passwords and update them regularly
  • Use centralised access management tools like Marlink’s Privileged Remote Access (PRA) solution.
  • Lock accounts after multiple failed login attempts and require two-factor authentication (2FA)

In an age where digital identity safeguards maritime infrastructure, password protection isn’t a technical recommendation, it’s a strategic priority