Blog Layout

One Culprit Behind Last Week’s Massive Cyberattack? Weak Passwords

One Culprit Behind Last Week’s Massive Cyberattack? Weak Passwords


Nils Desmet • Oct 27, 2018
Nils Desmet • Oct 27, 2018

It’s that time again—your regular Password Health Check-up is due.


Now, before your eyes start to ‘roll and scroll’, skipping on to something you haven’t heard before, listen to this–


Last week’s massive cyberattack, which outsmarted some of the best and brightest and shut down major sites like Amazon, Netflix, and Twitter for hours, equaling losses in the millions?


One of the culprits behind it all–weak passwords.


If you haven’t had time yet to read about the attack and how it all went down (literally), here’s a helpful analogy for the non-geek, via tech blogger QuHarrison Terry–


‘Imagine Dyn [the DNS provider that was attacked] is the US Postal Service. If someone wanted to shut down USPS, they would get thousands of people to stand outside of every post office, each holding thousands of pieces of mail. They would continue this for days upon days until mail begins collecting in piles ten-feet tall all over the post office. Eventually, the workers get too stressed from overwork and just quit and the USPS mail system would cease existence.’


In this case, the thousands of people at the post office were millions of ‘smart devices’ like DVRs and cameras (part of the world’s massive and growing ‘Internet of Things’ (IoT), these are physical items that are ‘internetworked’ across the information society we all know and use every day).


So how were hackers able to use (actually, ‘enslave’) these gadgets and gizmos, some of which you may have in your home or office, to bring Dyn to its knees with thousands of 10-feet tall piles of requests (to go back to our analogy outside the post office)?


Simple. The devices were easy to hack and infect with malware because they were set with weak passwords.


Many of the products used were made in China by Hangzhou Xiongmai Technology, which said on Sunday that their products have weak default passwords that are easy to infect. As of Sunday, Mirai (the malware used in the attack) had been found spreading to at least 500,000 devices.


Okay so, once again, here’s Password Safety 101. First off, as astronomer Clifford Stoll has taught us,


To expand just a little on that–



  • Never give out your password to anyone, even friends. Even a good friend may accidentally pass it along to others (or become an ex-friend).
  • Don’t use the same one for everything. If one of the sites you use it on is compromised, it will be easier for someone to break into your accounts elsewhere.
  • Create passwords that are easy to remember but hard for others to guess. Try using a short sentence or phrase and add some numbers. Or use only the first letter of each word of the phrase (i.e. “I went to Franklin Middle School in 1990” = “IwtFMSi#1990”). And make them at least a little different (by adding a couple of unique letters) for each site. On some sites you might even be able to type in the entire phrase.
  • Short passwords are easy to hack, so always make the password at least 8 characters long. The longer the better.
  • Include numbers, capital letters and symbols. Consider using a $ instead of an S or a 1 instead of an L, or including an & or %.
  • Don’t use dictionary words. If it’s in the dictionary, it is guessable and hackable; especially by software designed to do just that.
  • Don’t post your password in plain sight. This might seem obvious but studies have found that a lot of people post their password on their monitor with a sticky note. Bad idea. If you must write it down, hide the note somewhere where no one can find it.

You may also like

A computer monitor with a warning sign on it.
By Nils Desmet 25 Apr, 2024
Learn how to protect your business from Business Email Compromise (BEC) attacks with our comprehensive guide. Save yourself from BEC scams.
An isometric illustration of a cell phone with a magnifying glass on the screen.
By Nils Desmet 10 Apr, 2024
Learn more about domain management and discover how Makios can help you keep your brand's online presence secure and under control with expertise.
A pair of headphones sitting on top of a wooden table next to a clock.
By Nils Desmet 02 Apr, 2024
Say goodbye to frustrating wireless audio experiences and hello to true audio freedom with the Poly Voyager Free 60+ UC. See the features for yourself.
An envelope with a piece of paper and a red shield with a padlock on it.
By Nils Desmet 28 Mar, 2024
Learn the importance of DMARC in enhancing email security and how to implement it to protect against spam and phishing. It’s essential for businesses and email senders.
A screenshot of a web page with a list of next steps.
By Sarahi Miranda 13 Mar, 2024
Unlock the potential of Microsoft Loop with Makios Technology for seamless team collaboration and organization. Elevate your workflow effortlessly.
A dell desktop computer is sitting on a white surface.
By Ivan Flores 04 Mar, 2024
Discover the Dell Precision 3460 SFF, a powerful workstation designed for businesses. In our review, learn about its performance, design, and customization options.
a woman is holding a magnifying glass with the word scam on it.
By Nils Desmet 28 Feb, 2024
Protect yourself from scams and fraud with the help of Makios Technology. Learn how to identify potential scams and take legal action against them.
a telephone is sitting in front of a computer monitor
By Nils Desmet 13 Feb, 2024
Discover the key to success with our guide on creating and implementing a technology strategy that aligns with your business goals. Essential tips and steps are included.
a person is holding a cell phone in their hands in front of a laptop.
By Sarahi Miranda 06 Feb, 2024
Learn about the latest privacy and security features in iOS 17.3 for your iPhone. Keep your personal information safe and secure with these tips.
a man is sitting on the floor talking to a robot on a cell phone .
By Sarahi Miranda 26 Jan, 2024
Discover the top AI tools that businesses can leverage for efficiency, creativity, and gaining a competitive edge. Learn how to integrate these tools in 2024.
More Posts
Share by: