Password spraying is a low-and-slow authentication attack where adversaries attempt a small set of common passwords, like Winter2024! or Password1 — across many usernames. Unlike brute-force attacks, spraying avoids lockouts by rotating targets, making it an effective way to discover weak credentials at scale without triggering typical rate-based defenses.
In the MITRE ATT&CK framework, password spraying is a brute-force authentication technique classified under MITRE ATT&CK technique ID T1110.003: Brute Force – Password Spraying. It's not a vulnerability but a tactic used to exploit weak credential hygiene at scale while evading lockout mechanisms. Attackers target a large number of accounts using a limited set of commonly used passwords, spacing attempts to avoid detection.
Unlike dictionary or credential stuffing attacks, which rely on password reuse across services, password spraying doesn't require breached credentials. It's opportunistic by design, exploiting weak passwords combined with poor monitoring or poorly enforced password policies. Most often, it's a means of initial access or privilege escalation, not an exploit in the traditional sense.
You'll see password spraying referred to in threat reports as “low-and-slow brute forcing,” “spray attacks,” or “horizontal password attacks.” The core strategy remains consistent — avoid triggering account lockouts by distributing login attempts across users rather than concentrating on one account.
Password spraying has evolved in parallel with enterprise adoption of cloud authentication, particularly SSO portals and remote access platforms. Attackers have adapted tooling to automate rotation across services like Microsoft 365, Okta, and VPN gateways. In some cases, they now integrate CAPTCHA solvers and proxy infrastructure to bypass geofencing or rate-limiting.
In 2024, threat actors increasingly paired spraying with MFA fatigue and session token theft, chaining multiple techniques for stealthier access. Enterprise detection remained challenging due to low volume, IP diversity, and the appearance of legitimate login behavior.
Password spraying is engineered to evade traditional lockout protections and evade detection thresholds by reversing the brute-force model. Instead of targeting one account with many passwords, it targets many accounts using just a few common passwords in a distributed, time-separated manner.
The attacker typically begins with a list of valid usernames. These may come from open-source intelligence (OSINT), breached credential databases, misconfigured directory services, or tools like Kerbrute or GetADUsers.py for internal networks. Once a list is compiled, the attacker rotates through a handful of common or default passwords — such as "Spring2024!", "Welcome1", or "Password123" — applying each one to the entire user list before moving to the next.
The attack often proceeds in waves, timed to avoid triggering account lockouts or threshold-based anomaly detection. A single login attempt per account per password variant can span hours or days.
Attackers rely on frameworks that support slow and distributed credential testing. Commonly used tools include:
They often run these tools through TOR exit nodes, rotating residential proxies, or cloud VMs to diversify origin IPs and evade geofencing or rate-limiting filters. Credential sprays against SaaS and federated identity providers (e.g., Okta, Azure AD, Duo) have grown due to their centralized access and minimal user friction.
Password spraying works best against externally exposed login surfaces that don’t implement strict rate-limiting or MFA. Common targets include:
The core susceptibility to password spraying involves the oversight of two key security measures — the reliance on weak, guessable passwords and poorly tuned lockout policies or passive MFA configurations. Single sign-on and legacy authentication protocols like IMAP or POP3 can create indirect password-based access channels even when modern auth is enforced elsewhere.
A growing trend combines password spraying with MFA prompt analysis or enumeration. Attackers identify which users have MFA enabled by observing authentication response codes and then focus spraying on users without enforced MFA or with fallback SMS-based mechanisms that are easier to bypass.

Figure 1: Detection query example (for Microsoft 365/Azure)
The query in figure 1 identifies accounts with multiple failed login attempts leading to lockouts, a common side effect of failed spray attempts when incorrectly timed or improperly throttled. More advanced correlation involves comparing failed logins across disparate IPs with consistent user-agent strings.
Password spraying succeeds not through sophistication but by exploiting security fatigue — users choosing predictable passwords and administrators relying too heavily on legacy detection logic.
Password spraying plays a pivotal role in early-stage access operations. It's a credential-based attack method frequently used during the initial access or reconnaissance phase of a cyber attack, often serving as a precursor to deeper network compromise, privilege escalation, and eventual data exfiltration or ransomware deployment.
Attackers typically begin by harvesting usernames through OSINT, credential dumps, or enumeration against publicly exposed identity providers. Password spraying follows, using common passwords to avoid lockouts. Because the method targets authentication portals directly — Microsoft 365, Okta, VPNs, webmail — it bypasses many traditional perimeter defenses and probes the identity layer directly.
Spraying is especially effective in hybrid or cloud-first environments where federated identity enables access to multiple systems through a single compromised account. Attackers frequently pair this with session replay or token theft to move laterally post-compromise.
If spraying succeeds, attackers prioritize high-privilege accounts — administrators, service accounts, or executives — to gain broader control. Even low-privilege credentials can be leveraged to enumerate internal services or pivot toward misconfigured SaaS integrations or API tokens. Password spraying often transitions into more targeted credential dumping, Kerberoasting, or golden ticket attacks in on-premises Active Directory environments.
Once attackers access the target environment, they often establish persistence by abusing trusted identity providers. In Microsoft environments, attackers may register their own devices via Intune, create OAuth tokens using hijacked credentials, or persist access through service principals with delegated privileges. The entire chain relies on the foothold created by a successful spray.
From a foothold gained via password spraying, attackers can escalate privileges, map internal architecture, and exploit poorly segmented environments. In several data breaches, password spraying led directly to lateral movement via compromised VPN or RDP services. SaaS environments lacking behavioral monitoring are particularly vulnerable to exfiltration of email archives, file shares, or contact databases.
Password spraying is rarely an isolated tactic. It acts as the ignition point for sophisticated, multistage intrusion chains that exploit both identity weaknesses and architectural oversights. Its low technical barrier and high success rate make it a favorite tool for both opportunistic cybercriminals and advanced persistent threat (APT) actors.
Password spraying remains one of the most commonly reported external attack techniques. Its low resource requirements, high success rate, and difficulty to detect at scale make it a persistent threat across sectors, from finance to education to critical infrastructure.
In early 2023, Microsoft identified a coordinated password spraying campaign targeting Exchange Online users. The threat actors, attributed to a nation-state group, focused on diplomatic and defense organizations. They bypassed MFA in some cases by exploiting legacy protocols like IMAP and POP3, which didn’t enforce strong authentication. Once access was obtained, the attackers searched inboxes for sensitive diplomatic correspondence and credential resets. Microsoft recommended disabling legacy auth and tightening conditional access policies.
A compromised contractor account, accessed via password spraying, enabled threat actors to enroll a new MFA device and gain access to Cisco’s internal systems. In the 2022 incident, the attacker harvested employee credentials through previous breaches and tested them against Duo's portal. After gaining entry, they exfiltrated internal documents and source code repositories. The cyberattack highlighted the risk of incomplete offboarding and unmonitored contractor credentials.
CISA released an alert detailing how a federal agency’s external remote access services were breached through a password spray campaign. The attacker used an open-source tool to target Outlook Web Access and VPN login portals with a list of commonly used passwords. Once inside, the attacker implanted a web shell and maintained persistence through scheduled tasks. CISA emphasized the need for robust account lockout policies and federated identity hardening.
In 2023, APT28 conducted extensive password spraying against Microsoft 365 tenants of military and governmental institutions across Europe and North America. The campaign avoided triggering lockouts by rotating IP addresses and spreading attempts over weeks. Successful account compromises enabled surveillance of defense-related communications. Microsoft identified the attacker’s infrastructure and issued technical guidance for detecting residual activity, including sign-ins from TOR exit nodes and anomalous token usage.
Password spraying attacks are designed to evade traditional defenses by blending into normal authentication traffic. They don’t trip account lockouts because they target many accounts with a few common passwords, rather than brute-forcing one account with multiple guesses. Identifying these attacks requires careful correlation of authentication patterns, source behavior, and access context.
Common Indicators of Compromise (IOCs)
SIEMs should implement correlation rules that flag:
XDR tools should baseline normal authentication activity per user and per endpoint. Deviation from these baselines — such as logins attempted at unusual hours, across many accounts, or from headless browsers — should trigger review.
Enrich detections with threat intel on spray infrastructure, including TOR IPs, known bad ASNs, or domains linked to password spraying kits. Where possible, enrich logs with identity metadata to prioritize alerts for admin accounts or those with sensitive resource access.
Password spraying thrives on weak credentials and insufficient login protections. Effective defense demands layered controls that limit exposure, throttle misuse, and detect abnormal authentication patterns in real time.
Disable or restrict use of authentication mechanisms that don’t support modern defenses like MFA or account lockouts. Common high-risk targets include:
Segment these services behind zero trust access brokers or decommission them entirely if not in active use.
Multifactor authentication significantly limits the value of a compromised password. Enforce MFA across all user accounts, especially for:
Avoid fallback mechanisms that allow password-only access under certain conditions (e.g., “trusted device” exemptions).
Account lockouts after a defined number of failed logins — ideally paired with exponential backoff or progressive delays — can halt most spraying attempts. To reduce impact on legitimate users:
Rate-limit failed login attempts by IP address and user ID. Monitor aggregate login failures across time windows to detect slow, distributed password spraying campaigns. Use behavioral analytics to identify suspicious but low-frequency anomalies.
While user training won’t prevent spraying directly, educating staff about account security (e.g., avoiding password reuse, reporting MFA prompts they didn’t initiate) can reduce attacker success post-compromise.
Relying solely on signature-based threat detection or assuming VPNs protect against brute force is a false sense of security. Spraying often exploits what defenders forget to monitor — password-only endpoints, legacy ports, and unmonitored identity federation paths.
Preventing password spraying means closing systemic gaps. Defense must cover the identity surface area with precision, context awareness, and ongoing visibility.
Because password spraying often precedes deeper compromise, incident response efforts must combine immediate containment with long-term architectural improvements that harden identity infrastructure and remove blind spots from authentication telemetry.
When a password spraying attack is detected — either through behavioral alerts, identity provider logs, or third-party telemetry — immediate containment depends on confirming which accounts were successfully accessed. Begin by correlating failed login attempts with successful logins from the same IP, device fingerprint, or geography. Flag anomalous access patterns, especially outside normal business hours or from untrusted networks.
Lock potentially compromised accounts and force credential resets. Disable affected sessions in identity providers (e.g., Okta, Azure AD) to prevent lateral movement or token replay. Prioritize accounts with elevated privileges or third-party integrations.
Once the scope is mapped, investigate the root cause:
Audit federation configurations, authentication flows, and SIEM/XDR signal paths to ensure complete visibility into all authentication telemetry — especially from mobile clients, legacy apps, or non-browser-based traffic. Disable basic auth protocols where possible.
If the attack involved widespread credential testing across your environment, verify no other cyberattack modules (e.g., phishing or MFA fatigue) were chained in parallel.
Brief leadership on what occurred using plain, quantifiable language: number of attempted logins, number of confirmed compromises, and any systems accessed. Emphasize operational impact and dwell time, not just technical containment.
Notify internal stakeholders responsible for IAM, endpoint security, and cloud access. If third-party contractors or federated identities were targeted, alert partner organizations. For high-profile or regulated industries, coordinate with legal and compliance for breach notification if thresholds were exceeded.