{"id":90947,"date":"2020-04-23T09:00:22","date_gmt":"2020-04-23T16:00:22","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90947"},"modified":"2025-06-26T06:16:48","modified_gmt":"2025-06-26T13:16:48","slug":"protecting-organization-password-spray-attacks","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/","title":{"rendered":"Protecting your organization against password spray attacks"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">When hackers plan an attack, they often engage in a numbers game. They can invest significant time pursing a single, high-value target\u2014someone in the C-suite for example and do \u201cspear phishing.\u201d Or if they just need low-level access to gain a foothold in an organization or do reconnaissance, they target a huge volume of people and spend less time on each one which is called \u201cpassword spray.\u201d Last December Seema Kathuria and I described an example of the first approach in <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/12\/02\/spear-phishing-campaigns-sharper-than-you-think\/\" target=\"_blank\" rel=\"noopener noreferrer\">Spear phishing campaigns\u2014they\u2019re sharper than you think!<\/a> Today, I want to talk about a high-volume tactic: password spray.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In a password spray attack, adversaries \u201cspray\u201d passwords at a large volume of usernames. When I talk to security professionals in the field, I often compare password spray to a brute force attack. Brute force is targeted. The hacker goes after specific users and cycles through as many passwords as possible using either a full dictionary or one that\u2019s edited to common passwords. An even more targeted password guessing attack is when the hacker selects a person and conducts research to see if they can guess the user\u2019s password\u2014discovering family names through social media posts, for example. And then trying those variants against an account to gain access. Password spray is the opposite. Adversaries acquire a list of accounts and attempt to sign into all of them using a small subset of the most popular, or most likely, passwords. Until they get a hit. This blog describes the steps adversaries use to conduct these attacks and how you can reduce the risk to your organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"three-steps-to-a-successful-password-spray-attack\">Three steps to a successful password spray attack<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Step 1: Acquire a list of usernames<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It starts with a list of accounts. This is easier than it sounds. Most organizations have a formal convention for emails, such as <strong>firstname.lastname@company.com<\/strong>. This allows adversaries to construct usernames from a list of employees. If the bad actor has already compromised an account, they may try to enumerate usernames against the domain controller. Or, they find or buy usernames online. Data can be compiled from past security breaches, online profiles, etc. The adversary might even get some verified profiles for free!<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Step 2: Spray passwords<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Finding a list of common passwords is even easier. A Bing search reveals that publications list the most common passwords each year. <strong>123456<\/strong>, <strong>password<\/strong>, and <strong>qwerty<\/strong> are typically near the top. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wikipedia:10,000_most_common_passwords\" target=\"_blank\" rel=\"noopener noreferrer\">Wikipedia lists the top 10,000<\/a> passwords. There are regional differences that may be harder to discovery, but many people use a favorite sports teams, their state, or company as a password. For example, Seahawks is a popular password choice in the Seattle area. Once hackers do their research, they carefully select a password and try it against the entire list of accounts as shown in Figure 1. If the attack is not successful, they wait 30 minutes to avoid triggering a timeout, and then try the next password.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"327\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-EMBED.png\" alt=\"Protecting your organization against password spray attacks\" class=\"wp-image-90948\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-EMBED.png 474w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-EMBED-300x207.png 300w\" sizes=\"auto, (max-width: 474px) 100vw, 474px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 1:&nbsp; Password spray using one password across multiple accounts.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Step 3: Gain access<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Eventually one of the passwords works against one of the accounts. And that\u2019s what makes password spray a popular tactic\u2014attackers only need one successful password + username combination. Once they have it, they can access whatever the user has access to, such as cloud resources on OneDrive. Or use the exploited account to do internal reconnaissance on the target network and get deeper into the systems via elevation of privilege.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Even if the vast majority of your employees don\u2019t use popular passwords, there is a risk that hackers will find the ones that do. The trick is to reduce the number of guessable passwords used at your organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"configure-azure-active-directory-azure-ad-password-protection\">Configure Azure Active Directory (Azure AD) Password Protection<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/azure-ad-password-protection-is-now-generally-available\/ba-p\/377487\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD Password Protection<\/a> allows you to eliminate easily guessed passwords and customize lockout settings for your environment.&nbsp;This capability includes a globally banned password list that Microsoft maintains and updates. You can also block a custom list of passwords that are relevant to your region or company. Once enabled, users won\u2019t be able to choose a password on either of these lists, making it significantly less likely that an adversary can guess a user\u2019s password. You can also use this feature to define how many sign-in attempts will trigger a lockout and how long the lockout will last.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"simulate-attacks-with-office-365-advanced-threat-protection-office-365-atp\">Simulate attacks with Office 365 Advanced Threat Protection (Office 365 ATP)<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/attack-simulator?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Attack Simulator in Office 365 ATP<\/a> lets you run realistic, but simulated phishing and password attack campaigns in your organization. Pick a password and then run the campaign against as many users as you want. The results will let you know how many people are using that password. Use the data to train users and build your custom list of banned passwords.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"begin-your-passwordless-journey\">Begin your passwordless journey<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The best way to reduce your risk of password spray is to <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/12\/11\/go-passwordless-strengthen-security-reduce-costs\/\" target=\"_blank\" rel=\"noopener noreferrer\">eliminate passwords entirely<\/a>. Solutions like <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/hello-for-business\/hello-identity-verification\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Hello<\/a> or <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/concept-authentication-passwordless\" target=\"_blank\" rel=\"noopener noreferrer\">FIDO2 security keys<\/a> let users sign in using biometrics and\/or a physical key or device. Get started by enabling <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity\/mfa\" target=\"_blank\" rel=\"noopener noreferrer\">Multi-Factor Authentication (MFA)<\/a> across all your accounts. MFA requires that users sign in with at least two authentication factors: something they know (like a password or PIN), something they are (such as biometrics), and\/or something they have (such as a trusted device).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">We make progress in cybersecurity by increasing how much it costs the adversary to conduct the attack. If we make guessing passwords too hard, hackers will reduce their reliance on password spray.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Read about <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/azure-ad-password-protection-is-now-generally-available\/ba-p\/377487\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD Password Protection<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Learn more about <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/attack-simulator?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Attack Simulator in Office 365 ATP<\/a>.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity. For more information about our security solutions <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a>. Or reach out to me on&nbsp;<a href=\"https:\/\/www.linkedin.com\/in\/dianakelleysecuritycurve\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/twitter.com\/dianakelley14\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"provide-protection-for-third-party-apps\">Provide protection for third-party apps<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><a title=\"Original URL: https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise-mobility-security\/cloud-app-security. Click or tap if you trust this link.\" href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise-mobility-security\/cloud-app-security\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"Verified\">Microsoft Cloud App Security (MCAS)<\/a> monitors user sessions for third-party cloud apps, including G-Suite, AWS, and Salesforce. The MCAS detection engine looks for anomalous user activity for indicators of compromise. One indicator, &#8220;multiple failed login attempts,&#8221; can be used to create a dynamic baseline per user, across the tenant, and alert on anomalous login behavior that may represent an active brute force or password spray attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If your users sign in with guessable passwords, you may be at risk of a password spray attack.<\/p>\n","protected":false},"author":96,"featured_media":90958,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3823,3809],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3702,3703],"topic":[3688],"coauthors":[1916],"class_list":["post-90947","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-password-protection","tag-security-strategies","content-type-news","product-microsoft-entra","product-microsoft-entra-id","topic-threat-trends","review-flag-1694638265-576","review-flag-1694638265-83","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-and-o-1694638265-458"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting your organization against password spray attacks | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"If your users sign in with guessable passwords, you may be at risk of a password spray attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting your organization against password spray attacks\" \/>\n<meta property=\"og:description\" content=\"If your users sign in with guessable passwords, you may be at risk of a password spray attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-23T16:00:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T13:16:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Security Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Protecting your organization against password spray attacks\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Security Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-secure-blog-staff\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Security Team\"}],\"headline\":\"Protecting your organization against password spray attacks\",\"datePublished\":\"2020-04-23T16:00:22+00:00\",\"dateModified\":\"2025-06-26T13:16:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/\"},\"wordCount\":1056,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png\",\"keywords\":[\"Password protection\",\"Security strategies\"],\"articleSection\":[\"CISO series\",\"Compliance and security\",\"Cybersecurity\",\"Data Privacy\",\"Email security\",\"Identity and access management\",\"Microsoft Authenticator\",\"Mobile security\",\"Network security\",\"Phishing\",\"Security strategies\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/\",\"name\":\"Protecting your organization against password spray attacks | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png\",\"datePublished\":\"2020-04-23T16:00:22+00:00\",\"dateModified\":\"2025-06-26T13:16:48+00:00\",\"description\":\"If your users sign in with guessable passwords, you may be at risk of a password spray attack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png\",\"width\":1200,\"height\":630,\"caption\":\"Real people, real offices. Female developer coding at her desk.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting your organization against password spray attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/112e0d6f7a2c99efae36a4a1b2403c2d\",\"name\":\"Teri Seals-Dormer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g03d4afda56ae931a7066d88415e8df14\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g\",\"caption\":\"Teri Seals-Dormer\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-teseal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting your organization against password spray attacks | Microsoft Security Blog","description":"If your users sign in with guessable passwords, you may be at risk of a password spray attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Protecting your organization against password spray attacks","og_description":"If your users sign in with guessable passwords, you may be at risk of a password spray attack.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/","og_site_name":"Microsoft Security Blog","article_published_time":"2020-04-23T16:00:22+00:00","article_modified_time":"2025-06-26T13:16:48+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png","type":"image\/png"}],"author":"Microsoft Security Team","twitter_card":"summary_large_image","twitter_title":"Protecting your organization against password spray attacks","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png","twitter_misc":{"Written by":"Microsoft Security Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-secure-blog-staff\/","@type":"Person","@name":"Microsoft Security Team"}],"headline":"Protecting your organization against password spray attacks","datePublished":"2020-04-23T16:00:22+00:00","dateModified":"2025-06-26T13:16:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/"},"wordCount":1056,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png","keywords":["Password protection","Security strategies"],"articleSection":["CISO series","Compliance and security","Cybersecurity","Data Privacy","Email security","Identity and access management","Microsoft Authenticator","Mobile security","Network security","Phishing","Security strategies"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/","name":"Protecting your organization against password spray attacks | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png","datePublished":"2020-04-23T16:00:22+00:00","dateModified":"2025-06-26T13:16:48+00:00","description":"If your users sign in with guessable passwords, you may be at risk of a password spray attack.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/04\/Protecting-your-organization-against-password-spray-attacks-NEW_TV.png","width":1200,"height":630,"caption":"Real people, real offices. Female developer coding at her desk."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/23\/protecting-organization-password-spray-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Protecting your organization against password spray attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/112e0d6f7a2c99efae36a4a1b2403c2d","name":"Teri Seals-Dormer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g03d4afda56ae931a7066d88415e8df14","url":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g","caption":"Teri Seals-Dormer"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-teseal\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=90947"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90947\/revisions"}],"predecessor-version":[{"id":140524,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90947\/revisions\/140524"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/90958"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=90947"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=90947"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=90947"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=90947"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=90947"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=90947"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=90947"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=90947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}