{"id":39057,"date":"2021-01-08T21:36:39","date_gmt":"2021-01-08T21:36:39","guid":{"rendered":"http:\/\/09583257-1d72-42bb-844c-fc421635a368"},"modified":"2021-01-08T21:36:39","modified_gmt":"2021-01-08T21:36:39","slug":"cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/","title":{"rendered":"CISA: SolarWinds hackers also used password guessing to breach targets"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2019\/12\/05\/2c705868-b0b7-4764-91aa-b0b2f4d12a88\/login-password.jpg\" class alt=\"login password\"><\/span><figcaption><span class=\"caption\"><\/span><\/figcaption><\/figure>\n<p>The US Cybersecurity and Infrastructure Security Agency (CISA) said today that the threat actor behind the SolarWinds hack also used&nbsp;<strong>password guessing<\/strong>&nbsp;and&nbsp;<strong>password spraying<\/strong>&nbsp;attacks to breach targets as part of its recent hacking campaign and didn&#8217;t always rely on trojanized updates as its initial access vector.<\/p>\n<p>The new developments come as CISA said last month in its&nbsp;<a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-352a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">initial advisory on the SolarWinds incident<\/a>&nbsp;that it was investigating cases where the SolarWinds hackers breached targets that didn&#8217;t run the SolarWinds Orion software.<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/best-vpn-services-for-2021-safe-and-fast-dont-come-for-free\/#link=%7B%22role%22:%22standard%22,%22href%22:%22https:\/\/www.zdnet.com\/article\/best-vpn-services-for-2021-safe-and-fast-dont-come-for-free\/%22,%22target%22:%22_blank%22,%22absolute%22:%22%22,%22linkText%22:%22%3Cstrong%3EBest%20VPNs%20for%202021%3C\/strong%3E%22%7D\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Best VPNs<\/strong><\/a><\/p>\n<p>While no details were provided at the time, in an update to its original advisory posted this week, CISA said it finally confirmed that the SolarWinds hackers also relied on password guessing and password spraying as initial access vectors.<\/p>\n<p>&#8220;CISA incident response investigations have identified that initial access in some cases was obtained by password guessing [<a href=\"https:\/\/attack.mitre.org\/versions\/v8\/techniques\/T1110\/001\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">T1101.001<\/a>], password spraying [<a href=\"https:\/\/attack.mitre.org\/versions\/v8\/techniques\/T1110\/003\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">T1101.003<\/a>], and inappropriately secured administrative credentials [<a href=\"https:\/\/attack.mitre.org\/versions\/v8\/techniques\/T1078\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">T1078<\/a>] accessible via external remote access services [<a href=\"https:\/\/attack.mitre.org\/versions\/v8\/techniques\/T1133\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">T1133<\/a>],&#8221; the agency said on Wednesday.<\/p>\n<p>Once threat actors gained access to internal networks or cloud infrastructure, CISA said the hackers,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/us-government-formally-blames-russia-for-solarwinds-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">believed to be Russian in origin<\/a>, escalated access to gain administrator rights and then moved to forge authentication tokens (OAuth) that allowed them to access other local or cloud-hosted resources inside a company&#8217;s network, without needing to provide valid credentials or solve multi-factor authentication challenges.<\/p>\n<p>In a&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/12\/28\/using-microsoft-365-defender-to-coordinate-protection-against-solorigate\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">report<\/a>&nbsp;published on December 28, Microsoft said the threat actor&#8217;s primary goal was to gain access to cloud-hosted infrastructure, which in many cases was the company&#8217;s own Azure and Microsoft 365 environments.<\/p>\n<h3>CISA releases Microsoft cloud-specific guidance<\/h3>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>To help victims deal with these &#8220;to-cloud&#8221; escalations, CISA has also published a second advisory today with&nbsp;<a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-008a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">guidance<\/a>&nbsp;on how to search Microsoft-based cloud setups for traces of this group&#8217;s activity and then remediate servers.<\/p>\n<p>CISA said the guidance is &#8220;irrespective of the initial access vector&#8221; that the SolarWinds hackers leveraged to gain control of cloud resources and should apply even if the initial access vector was the trojanized Orion app or a password guessing\/spraying attack.<\/p>\n<p>The guidance also references&nbsp;<a href=\"https:\/\/github.com\/cisagov\/Sparrow\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Sparrow<\/a>, a tool CISA released last year during the SolarWinds breach investigation to help victims detect possible compromised accounts and applications in the Azure Microsoft 365 environments.<\/p>\n<p>Security firm CrowdStrike also released a similar tool called&nbsp;<a href=\"https:\/\/www.crowdstrike.com\/blog\/crowdstrike-launches-free-tool-to-identify-and-help-mitigate-risks-in-azure-active-directory\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CST<\/a>.<\/p>\n<div class=\"relatedContent alignNone\">\n<h3 class=\"heading\"> <span class=\"int\">SolarWinds Updates<\/span> <\/h3>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CISA says the threat actor behind the SolarWinds hack also used password guessing and password spraying to breach targets, not just trojanized updates.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39058,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-39057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA: SolarWinds hackers also used password guessing to breach targets 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA: SolarWinds hackers also used password guessing to breach targets 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-08T21:36:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"430\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CISA: SolarWinds hackers also used password guessing to breach targets\",\"datePublished\":\"2021-01-08T21:36:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/\"},\"wordCount\":413,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/\",\"name\":\"CISA: SolarWinds hackers also used password guessing to breach targets 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg\",\"datePublished\":\"2021-01-08T21:36:39+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg\",\"width\":1000,\"height\":430},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA: SolarWinds hackers also used password guessing to breach targets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA: SolarWinds hackers also used password guessing to breach targets 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/","og_locale":"en_US","og_type":"article","og_title":"CISA: SolarWinds hackers also used password guessing to breach targets 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-01-08T21:36:39+00:00","og_image":[{"width":1000,"height":430,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CISA: SolarWinds hackers also used password guessing to breach targets","datePublished":"2021-01-08T21:36:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/"},"wordCount":413,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/","url":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/","name":"CISA: SolarWinds hackers also used password guessing to breach targets 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg","datePublished":"2021-01-08T21:36:39+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg","width":1000,"height":430},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"CISA: SolarWinds hackers also used password guessing to breach targets"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39057"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39057\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39058"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}