As safety professionals, it is simple to get caught up in a race to counter the newest superior adversary methods. But probably the most impactful assaults usually aren’t from cutting-edge exploits, however from cracked credentials and compromised accounts. Regardless of widespread consciousness of this risk vector, Picus Safety’s Blue Report 2025 exhibits that organizations proceed to wrestle with stopping password cracking assaults and detecting the malicious use of compromised accounts.
With the primary half of 2025 behind us, compromised legitimate accounts stay probably the most underprevented assault vector, highlighting the pressing want for a proactive strategy centered on the threats which might be evading organizations’ defenses.
A Wake-Up Name: The Alarming Rise in Password Cracking Success
The Picus Blue Report is an annual analysis publication that analyzes how effectively organizations are stopping and detecting real-world cyber threats. Not like conventional stories that focus solely on risk traits or survey knowledge, the Blue Report relies on empirical findings from over 160 million assault simulations carried out inside organizations’ networks world wide, utilizing the Picus Safety Validation Platform.
Within the Blue Report 2025, Picus Labs discovered that password cracking makes an attempt succeeded in 46% of examined environments, practically doubling the success charge from final 12 months. This sharp enhance highlights a basic weak spot in how organizations are managing – or mismanaging – their password insurance policies. Weak passwords and outdated hashing algorithms proceed to depart essential programs susceptible to attackers utilizing brute-force or rainbow desk assaults to crack passwords and achieve unauthorized entry.
On condition that password cracking is likely one of the oldest and most reliably efficient assault strategies, this discovering factors to a severe subject: of their race to fight the newest, most refined new breed of threats, many organizations are failing to implement sturdy primary password hygiene insurance policies whereas failing to undertake and combine fashionable authentication practices into their defenses.
Why Organizations Are Failing to Forestall Password Cracking Assaults
So, why are organizations nonetheless failing to forestall password cracking assaults? The foundation trigger lies within the continued use of weak passwords and outdated credential storage strategies. Many organizations nonetheless depend on simply guessable passwords and weak hashing algorithms, usually with out utilizing correct salting methods or multi-factor authentication (MFA).
In truth, our survey outcomes confirmed that 46% of environments had not less than one password hash cracked and transformed to cleartext, highlighting the inadequacy of many password insurance policies, notably for inside accounts, the place controls are sometimes extra lax than they’re for his or her exterior counterparts.
To fight this, organizations should implement stronger password insurance policies, implement multi-factor authentication (MFA) for all customers, and often validate their credential defenses. With out these enhancements, attackers will proceed to compromise legitimate accounts, acquiring quick access to essential programs.
Credential-Based mostly Assaults: A Silent however Devastating Risk
The specter of credential abuse is each pervasive and harmful, but because the Blue Report 2025 highlights, organizations are nonetheless underprepared for this type of assault. And as soon as attackers receive legitimate credentials, they will simply transfer laterally, escalate privileges, and compromise essential programs.
Infostealers and ransomware teams incessantly depend on stolen credentials to unfold throughout networks, burrowing deeper and deeper, usually with out triggering detection. This stealthy motion throughout the community permits attackers to preserve lengthy dwell occasions, undetected, whereas they exfiltrate knowledge at will.
Regardless of this ongoing and well-known subject, organizations proceed to prioritize perimeter defenses, usually leaving id and credential safety neglected and under-funded because of this. This 12 months’s Blue Report clearly exhibits that legitimate account abuse is on the core of contemporary cyberattacks, reinforcing the pressing want for a stronger concentrate on id safety and credential validation.
Legitimate Accounts (T1078): The Most Exploited Path to Compromise
One of many key findings within the Blue Report 2025 is that Legitimate Accounts (MITRE ATT&CK T1078) stays the most exploited assault approach, with a really regarding 98% success charge. Which means as soon as attackers achieve entry to legitimate credentials, whether or not via password cracking or preliminary entry brokers, they will swiftly transfer via a company’s community, usually bypassing conventional defenses.
The usage of compromised credentials is especially efficient as a result of it permits attackers to function beneath the radar, making it more durable for safety groups to detect malicious exercise. As soon as inside, they will entry delicate knowledge, deploy malware, or create new assault paths, all whereas seamlessly mixing in with official person exercise.
Find out how to Strengthen Your Defenses In opposition to Credential Abuse and Password Cracking
To guard in opposition to more and more efficient assaults, organizations ought to implement stronger password insurance policies and implement complexity necessities, whereas eliminating outdated hashing algorithms in favor of safer options. It is usually important to undertake multi-factor authentication (MFA) for all delicate accounts, making certain that even when credentials do develop into compromised, attackers cannot simply use them to entry the community with out an extra verification step.
Often validating credential defenses via simulated assaults is essential to figuring out vulnerabilities and making certain that your controls are performing as anticipated. Organizations additionally must improve their behavioral detection capabilities to catch anomalous actions tied to credential abuse and lateral motion.
Moreover, monitoring and inspecting outbound site visitors for indicators of knowledge exfiltration and making certain that knowledge loss prevention (DLP) measures are each in place and working successfully are essential to defending your delicate info.
Closing the Gaps in Credential and Password Administration
The findings within the Blue Report 2025 present that, sadly, many organizations are nonetheless susceptible to the silent risk of password cracking and compromised accounts. And whereas strengthening perimeter defenses continues to be a precedence, it is also clear that core weaknesses lie in credential administration and inside controls. The report additionally highlighted the truth that infostealers and ransomware teams are leveraging these gaps successfully.
In the event you’re able to take proactive steps to harden your safety posture, scale back your publicity, and prioritize your essential vulnerabilities, the Blue Report 2025 gives invaluable insights to indicate you the place to focus. And at Picus Safety, we’re at all times glad to speak about serving to your group meet its particular safety wants..
Remember to get your copy of The Blue Report 2025 and take proactive steps as we speak to enhance your safety posture.


