Password Spraying
Password spraying is a type of cyberattack where an attacker tries a small number of commonly used passwords against a large number of user accounts. Unlike traditional brute force attacks that try many passwords against a single account, password spraying spreads attempts across many accounts to avoid triggering lockout policies. The goal is to gain unauthorized access to at least one account without detection.
Password spraying is a credential-based account takeover (ATO) attack technique classified as a variant of brute force. The attacker iterates through a list of valid or probable usernames, attempting one or a small set of commonly used or default passwords per account per authentication cycle. This approach is designed to remain below per-account failed-login thresholds that would trigger lockout or alerting controls. The attack typically relies on a curated list of high-frequency passwords combined with harvested or enumerated usernames. Because the number of attempts per account is intentionally kept low, traditional single-account lockout mechanisms are often insufficient as a sole control. Detection typically requires cross-account anomaly analysis at the identity provider or authentication layer, examining patterns such as distributed low-volume failures across many accounts within a defined time window.
Why it matters
Password spraying is effective precisely because it exploits a gap between how lockout policies are designed and how attackers operate. Traditional account lockout controls are scoped to per-account failure counts, and password spraying deliberately stays below those thresholds by distributing attempts across many accounts. This means the attack can succeed silently, with no single account ever triggering an alert, even as the attacker cycles through hundreds or thousands of usernames. A single compromised account is often sufficient for an attacker to establish an initial foothold, escalate privileges, or move laterally within a network.
The technique is particularly dangerous in environments where users rely on weak or commonly reused passwords, and where authentication systems lack cross-account anomaly detection. Cloud-based identity providers and single sign-on systems are frequent targets because a successful spray against one account can grant access to many downstream services. Organizations that have not implemented multi-factor authentication are especially exposed, since password-only authentication offers no additional barrier once valid credentials are obtained.
Password spraying has been documented as a tactic used in significant intrusion campaigns against enterprise and government targets. Microsoft has published incident response playbook guidance specifically addressing password spray detection, reflecting how frequently this technique appears in real-world investigations. The combination of low technical complexity, high scalability, and limited detection surface makes password spraying a persistent threat across industries.
Who it's relevant to
Inside Password Spraying
Common questions
Answers to the questions practitioners most commonly ask about Password Spraying.