Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsPassword Guessing without AI: How Attackers Build Targeted Wordlists
Password Guessing without AI: How Attackers Build Targeted Wordlists
Cybersecurity

Password Guessing without AI: How Attackers Build Targeted Wordlists

•February 9, 2026
0
BleepingComputer
BleepingComputer•Feb 9, 2026

Companies Mentioned

Microsoft

Microsoft

MSFT

Why It Matters

Context‑specific wordlists dramatically raise the success rate of credential‑guessing attacks, exposing a gap between policy compliance and real‑world security. Addressing this gap is essential for organizations to protect authentication assets against increasingly efficient, low‑noise attacks.

Key Takeaways

  • •Attackers harvest org-specific language using tools like CeWL.
  • •Targeted wordlists bypass generic password dictionaries and complexity rules.
  • •NIST advises blocking context‑derived passwords and using long passphrases.
  • •MFA mitigates risk even when passwords are compromised.
  • •Defenders should block known-compromised and organization-specific passwords.

Pulse Analysis

Modern password security faces a paradox: users need memorable credentials, yet attackers exploit exactly that memorability by mining an organization’s own language. Open‑source crawlers such as CeWL scan public websites, documentation, and marketing material, extracting terms that employees routinely see. By limiting crawl depth and word length, attackers produce concise, high‑value lists that mirror the vocabulary used in everyday work. These lists become the seed for automated mutation engines, which append numbers, symbols, or leet substitutions, creating millions of guesses that satisfy typical complexity policies while remaining highly guessable.

The effectiveness of this approach lies in its relevance, not its novelty. NIST SP 800‑63B explicitly recommends banning passwords that contain service names, usernames, or other context‑specific words, yet many enterprises still enforce only length and character‑type rules. Research on billions of breached passwords shows that even complex‑looking passwords like "HospitalName123!" are easily cracked when derived from known organizational terms. Attackers combine harvested wordlists with hash‑cracking tools such as Hashcat, applying mutation rules at scale to compromised hash dumps or live login portals, often using low‑and‑slow techniques to evade detection.

Defenders must shift from compliance‑centric complexity checks to context‑aware controls. Blocking passwords that contain company names, product titles, or industry jargon, alongside known‑compromised credentials, reduces the attack surface dramatically. Enforcing 15‑character passphrases increases entropy far beyond what simple mutations can achieve. Finally, multi‑factor authentication adds a critical second factor, rendering stolen passwords ineffective on their own. By aligning password policies with the tactics attackers actually use, organizations can turn passwords back into a viable security control rather than a weak link.

Password guessing without AI: How attackers build targeted wordlists

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...