This algorithm can probably guess your password
TarGuess framework uses mathematical models to crack your paswords
University researchers have developed a framework that can guess passwords 73% of the time.
The system, called Targuess, was built by researchers from Lancaster University, Peking University and Fujian Normal University, whopublisheda paper on their efforts, saying thatagainst more security-conscious users, the framework can still claim success 32% of the time.
While trawling online/offline password guessing has been intensively studied, only a few studies have examined targeted online guessing, where an attacker guesses a specific victim's password for a service, by exploiting the victim's personal information, such as one sister password leaked from another account and some personally identifiable information (PII).
"A key challenge for targeted online guessing is to choose the most effective password candidates, while the number of guess attempts allowed by a server's lockout or throttling mechanisms is typically very small," said the authors.
The researchers said that TarGuess "systematically characterises typical targeted guessing scenarios with seven sound mathematical models", each of which is based on varied kinds of data available to an attacker. These models allow the team to design novel and efficient guessing algorithms.
The team then carried out experiments using 10 large real-world password datasets, notably including ones found in the Yahoo breach. Among the ten most popular passwords used on Yahoo were (unsurprisingly) 123456, password, welcome, and ninja, among others.
Targuess was trained up on one set of passwords from one website and then used its training to guess passwords users used on other websites.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.
The researchers said that the results from the framework suggested that currently used security mechanisms would be largely ineffective against the targeted online guessing threat, and this threat has already become much more damaging than expected.
"We believe that the new algorithms and knowledge of effectiveness of targeted guessing models can shed light on both existing password practice and future password research," said the authors.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.