{"id":2555,"date":"2024-01-31T13:59:33","date_gmt":"2024-01-31T13:59:33","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=2555"},"modified":"2025-12-02T13:53:33","modified_gmt":"2025-12-02T13:53:33","slug":"password-based-attacks-identity-attacks","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/","title":{"rendered":"Password Based Attacks (Identity Attacks)"},"content":{"rendered":"\n<p>Authorisation based on identity has evolved into a fundamental pillar for safeguarding the digital world. Granting access to various online systems brings significant benefits, yet also entails a rising danger of cyberattacks targeting identity.<\/p>\n\n\n\n<p>Unfortunately, identity-driven attacks are extremely hard to detect. When a valid user\u2019s credentials have been compromised and an adversary is masquerading as that user, it is often very difficult to differentiate between the user\u2019s typical behaviour and that of the hacker when using traditional security measures and tools.<\/p>\n\n\n\n<p>Between April 2022 and April 2023, Microsoft reported that 4,000 password attacks were blocked by their security systems every second, with a peak in April 2023 with an average of 11,000 attacks per second. The escalation from 3 billion per month to more than 30 billion attempted attacks per month highlights the critical importance of fortifying your systems and exploring alternative approaches to safeguard your accounts.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:11px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-an-identity-attack\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">What is an Identity Attack?<\/mark><\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>An identity-based attack is a cyberattack that targets and compromises the digital identity of individuals, organisations, or entities. The attacker will try to steal, alter, or misuse identity-related information such as usernames, domain names, email addresses, passwords, personal data, or digital certificates. The goal is often to gain access to systems, data, or resources, to commit fraud, or conduct malicious activities whilst hiding behind legitimate users or entities.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In this blog we will share information on the use of one-time password bots, Multifactor Authentication (MFA) fatigue, the importance of MFA and actionable insights you can follow to avoid password-based attacks.&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/01\/Website-long-Images-7.png\" alt=\"Blue viewer\" class=\"wp-image-2556\" style=\"width:369px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">One-Time Password Bots<\/mark><\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Multi-factor Authorisation remains an effective security measure which adds an extra layer of security. However, cybercriminals still manage to find their way to bypass it. One tactic they use is a one-time password bot (OTP bots) to gain access and perform account takeovers. OTP bots extract authentication codes from users by tricking them into providing the OTP sent to them via SMS, authentication apps, or email. The cybercriminal loads the victim\u2019s phone number into the OTP bot, which calls the victim and pretends to be a legitimate service provider. The bot tells the victim there has been suspicious activity on their account and asks them to enter the OTP for \u201csecurity verification.\u201d The entered password is then sent back to the cybercriminal, granting them access to the victim\u2019s account.&nbsp;<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">MFA Fatigue Attacks are Threats<\/mark><\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Multifactor authentication has increased in importance, which is why attackers have adapted their methods by sending MFA or passwordless sign-in prompts to potential victims, known as MFA Bombing\/Spamming. It is a social engineering tactic where the attackers overwhelm their victims with repeated MFA requests causing MFA fatigue tricking the victims into accidentally approving requests. Once the victim does so, the attacker gains full access to accounts and allows them to modify the MFA settings which gives them the authority to sign in at any time.&nbsp;<\/p>\n\n\n\n<p>6,000 MFA fatigue attempts were observed per day by the end of June 2023, which indicates that cybersecurity attacks targeting MFA and passwordless sign-in are on the rise.&nbsp;<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#47ceb9\" class=\"has-inline-color\">You can protect yourself and your organisation against MFA attacks by:<\/mark><\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Tighten MFA Parameters:<\/strong> Reduce the time between factor authentications, limit the number of unsuccessful access attempts and increase the number of factors that are required to gain access.&nbsp;<\/p>\n\n\n\n<p><strong>Improve security awareness around MFA<\/strong>: Frequent user education is essential. Train users, third-party contractors and vendors who operate within your resources on how to detect MFA attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Look into Password Management &amp; Authentication beyond MFA<\/strong>: Implementing FIDO2 (Fast Identity Online) authentication can be a powerful tool which eliminates password-only logins by replacing them with possession-based identification that is stored on a personal device.&nbsp;<\/p>\n\n\n\n<p><strong>Enforce Least Privilege:<\/strong> This restricts access rights for users to only those who require the access to certain resources. If a compromised account lacks admin rights, it reduces the ability for attackers to access large amounts of data.&nbsp;<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Token Replay Attacks<\/mark><\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Token replay attacks are a type of cyberattack where an attacker catches and retransmits valid authentication tokens to gain illegal access to a system or service. These are often used to verify the identity of a user or device without requiring a password or other credentials. The attackers acquire the tokens through malware, phishing, or MFA fatigue to launch additional attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<p>While token replay attacks account for less than three percent of all identity compromises, the consistent increase in detections suggests that cybercriminals still view it as an effective approach for attacks.&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:37px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/01\/Untitled-design-2024-01-04T122407.038.png\" alt=\"\" class=\"wp-image-2468\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">The Importance of MFA Enablement on Virtual Private Networks (VPN)&nbsp;<\/mark><\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>VPNs have been used for many years to enable remote access to company resources via encrypted tunnels. However, ensuring that an organisations security strategy is compliant, configuration and alignment with a modern secure architecture is essential. VPNs extensive use within corporate networks and availability from the internet has made them into an easy target for attacks due to misconfigurations, such as insufficient monitoring of user accounts and devices. Within corporate setups, users are typically assigned separate VPN accounts that have restricted access to the internal network. The use of MFA for these individual accounts is crucial for any VPN risk mitigation strategy. Implementing <a href=\"https:\/\/cwsisecurity.com\/what-is-conditional-access\/\" target=\"_blank\" rel=\"noreferrer noopener\">conditional access<\/a>, monitoring and integrating security automation are also essential steps to ensure that these accounts remain secure.\u00a0\u00a0<\/p>\n\n\n\n<p>Microsoft detected 158 million instances of password reuse across sites in June 2023. Enhance your security to keep identity-based attacks in the past by following the next actionable insights.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#47ceb9\" class=\"has-inline-color\">Actionable Insights<\/mark><\/h3>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Use authenticator apps instead of relying solely on text message codes.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>Never share your security codes with anyone.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>Create strong and unique passwords using password generators. Use password managers to save your passwords securely.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li>Educate yourself and your employees about common social engineering tactics to recognise and avoid interactions with OTP bots.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li>Consider implementing risk-based and token protection policies in Conditional Access.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"6\" class=\"wp-block-list\">\n<li>Monitor systems for signs of token replay.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"7\" class=\"wp-block-list\">\n<li>Use non-phishable credentials which bind the token to the legitimate user\u2019s device, such as Windows Hello for Business and FIDO (Fast Identity Online) keys.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"8\" class=\"wp-block-list\">\n<li>Use a unique password for each site.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"9\" class=\"wp-block-list\">\n<li>Secure your devices and accounts with multifactor authentication.&nbsp;<\/li>\n<\/ol>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">How Can We Help?<\/mark><\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>As a Microsoft Solutions partner and a member of the Microsoft Intelligent Security Association (MISA), CWSI has the expertise in privacy and data protection required to help you govern and safeguard your data as well as improve your compliance posture.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Want to learn more about what we can do to help? Contact us today via the form below.<\/p>\n\n\n\n<iframe loading=\"lazy\" src=\"https:\/\/cwsiinsights.cwsi.ie\/l\/1024581\/2024-01-18\/7jr98\" width=\"100%\" height=\"700\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\n\n\n\n<p>Read the full Microsoft Digital Defence report <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" target=\"_blank\" rel=\"noreferrer noopener\">HERE<\/a>.&nbsp;&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authorisation based on identity has evolved into a fundamental pillar for safeguarding the digital world. Granting access to various online systems brings significant benefits, yet also entails a rising danger of cyberattacks targeting identity. Unfortunately, identity-driven attacks are extremely hard to detect. When a valid user\u2019s credentials have been compromised and an adversary is masquerading [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":506,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[93,4],"tags":[15],"class_list":["post-2555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice","tag-identity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Password Based Attacks (Identity Attacks) - CWSI<\/title>\n<meta name=\"description\" content=\"An identity-based attack is a cyberattack that targets and compromises the digital identity of individuals, organisations, or entities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Password Based Attacks (Identity Attacks)\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-31T13:59:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-02T13:53:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-376@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"360\" \/>\n\t<meta property=\"og:image:height\" content=\"129\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/\"},\"headline\":\"Password Based Attacks (Identity Attacks)\",\"datePublished\":\"2024-01-31T13:59:33+00:00\",\"dateModified\":\"2025-12-02T13:53:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/\"},\"wordCount\":1107,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-376@2x.png\",\"keywords\":[\"Identity\"],\"articleSection\":[\"Insights\",\"Our Voice\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/\",\"name\":\"Password Based Attacks (Identity Attacks) - CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-376@2x.png\",\"datePublished\":\"2024-01-31T13:59:33+00:00\",\"dateModified\":\"2025-12-02T13:53:33+00:00\",\"description\":\"An identity-based attack is a cyberattack that targets and compromises the digital identity of individuals, organisations, or entities.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-376@2x.png\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/Group-376@2x.png\",\"width\":360,\"height\":129},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/password-based-attacks-identity-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Password Based Attacks (Identity Attacks)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Password Based Attacks (Identity Attacks) - CWSI","description":"An identity-based attack is a cyberattack that targets and compromises the digital identity of individuals, organisations, or entities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/","og_locale":"nl_NL","og_type":"article","og_title":"Password Based Attacks (Identity Attacks)","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/","og_site_name":"CWSI","article_published_time":"2024-01-31T13:59:33+00:00","article_modified_time":"2025-12-02T13:53:33+00:00","og_image":[{"width":360,"height":129,"url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-376@2x.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"6 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/"},"headline":"Password Based Attacks (Identity Attacks)","datePublished":"2024-01-31T13:59:33+00:00","dateModified":"2025-12-02T13:53:33+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/"},"wordCount":1107,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-376@2x.png","keywords":["Identity"],"articleSection":["Insights","Our Voice"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/","url":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/","name":"Password Based Attacks (Identity Attacks) - CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-376@2x.png","datePublished":"2024-01-31T13:59:33+00:00","dateModified":"2025-12-02T13:53:33+00:00","description":"An identity-based attack is a cyberattack that targets and compromises the digital identity of individuals, organisations, or entities.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/#primaryimage","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-376@2x.png","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2025\/11\/Group-376@2x.png","width":360,"height":129},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/password-based-attacks-identity-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Password Based Attacks (Identity Attacks)"}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=2555"}],"version-history":[{"count":0,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2555\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media\/506"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=2555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=2555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=2555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}