{"id":111734,"date":"2025-05-23T16:57:01","date_gmt":"2025-05-23T08:57:01","guid":{"rendered":"https:\/\/version-2.com\/?p=111734"},"modified":"2025-05-21T16:59:17","modified_gmt":"2025-05-21T08:59:17","slug":"ai-is-now-being-used-to-guess-your-business-passwords","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/05\/ai-is-now-being-used-to-guess-your-business-passwords\/","title":{"rendered":"AI is now being used to guess your business passwords"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"111734\" class=\"elementor elementor-111734\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/444ad3f993\/5-cyber-threats-1062x597-1.png\/m\/828x0\/filters:quality(60):format(avif)\" width=\"828\" height=\"465\" \/><\/p><div class=\"Article_wrapper__8_7eU [&amp;&gt;&lt;p&gt;*+*]:mt-12\"><div class=\"richtext\"><p class=\"body-md text-primary\">When you think of a password manager, you probably think about its ability to generate unique and secure passwords for every account. While that\u2019s true, password managers also protect against a range of technical threats you might not expect\u2014threats that can devastate businesses, from phishing attacks using Punycode domains that trick employees into revealing corporate credentials to keyloggers and brute-force attacks on admin panels that expose sensitive systems.\u00a0<\/p><p class=\"body-md text-primary\">In 2025, with <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/www.vikingcloud.com\/blog\/cybersecurity-statistics\" data-ga-slug=\"74% of all data breaches\" data-testid=\"74-of-all-data-breaches-in-na\" data-link-full-refresh=\"true\"><u>74% of all data breaches<\/u><\/a> involving some kind of human element or error and costing companies millions in downtime and fines, password managers like NordPass are far more powerful than just a password generator\u2014they\u2019re a business\u2019s shield against financial and reputational ruin. In this article, we\u2019ll break down 5 cyber threats and explain exactly how password managers defend against them.<\/p><h2 class=\"heading-xl text-primary\"><b>1. Phishing<\/b><\/h2><p class=\"body-md text-primary\">Phishing is a <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/nordpass.com\/blog\/what-is-phishing\/\" data-ga-slug=\"cyberattack\" data-testid=\"cyberattack-in-na\" data-link-full-refresh=\"true\"><u>cyberattack<\/u><\/a> in which attackers trick users into revealing sensitive information, like usernames and passwords, by creating fraudulent websites that mimic legitimate ones. This type of attack is a huge problem, especially for businesses losing data to fake login pages. In 2025 so far, phishing has accounted for <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/www.stationx.net\/phishing-statistics\/\" data-ga-slug=\"over 36%\" data-testid=\"over-36-in-na\" data-link-full-refresh=\"true\"><u>over 36%<\/u><\/a> of all data breaches, and about <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/aag-it.com\/the-latest-phishing-statistics\/\" data-ga-slug=\"3.4 billion phishing emails\" data-testid=\"34-billion-phishing-emails-in-na\" data-link-full-refresh=\"true\"><u>3.4 billion phishing emails<\/u><\/a> are sent every day. These numbers show how widespread and persistent phishing has become.<\/p><p class=\"body-md text-primary\">These attacks often rely on techniques like Punycode domains, hijacked subdomains, and typosquatting to deceive users. Phishing links are commonly distributed via email, SMS, or malicious ads, directing victims to fake login pages where their credentials are captured.\u00a0<\/p><p class=\"body-md text-primary\">For example, an attacker might create a domain like <a href=\"http:\/\/www.go\u043egle.com\" rel=\"nofollow\">http:\/\/www.go\u043egle.com<\/a> (using the Cyrillic &#8220;\u043e&#8221; instead of the Latin &#8220;o&#8221;), which looks nearly identical to <a href=\"http:\/\/www.google.com\" rel=\"nofollow\">http:\/\/www.google.com<\/a> but directs users to a malicious site. Alternatively, attackers might exploit a misconfigured DNS setting to hijack a subdomain, like secure.login.example.com, making the phishing site appear as if it belongs to the legitimate example.com. In typosquatting, domains like <a href=\"http:\/\/www.faceboook.com\" rel=\"nofollow\">http:\/\/www.faceboook.com<\/a> or <a href=\"http:\/\/www.pay-pal.com\" rel=\"nofollow\">http:\/\/www.pay-pal.com<\/a> are registered to exploit common user typing errors.<\/p><p><img decoding=\"async\" class=\"\" style=\"color: transparent;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x1140\/016fc8b701\/asset-2-746x573.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x1140\/016fc8b701\/asset-2-746x573.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x1140\/016fc8b701\/asset-2-746x573.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x1140\/016fc8b701\/asset-2-746x573.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x1140\/016fc8b701\/asset-2-746x573.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x1140\/016fc8b701\/asset-2-746x573.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x1140\/016fc8b701\/asset-2-746x573.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x1140\/016fc8b701\/asset-2-746x573.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x1140\/016fc8b701\/asset-2-746x573.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x1140\/016fc8b701\/asset-2-746x573.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"asset2\" width=\"746\" height=\"573\" data-nimg=\"1\" \/><\/p><p class=\"body-md text-primary\">Image: An example of an open-source phishing kit<\/p><p class=\"body-md text-primary\">Password managers protect against phishing by using exact domain matching when autofilling credentials. When a user visits a phishing site, even if the domain visually resembles the legitimate one, the password manager recognizes the mismatch and refuses to autofill credentials.\u00a0<\/p><p class=\"body-md text-primary\">For instance, if credentials are saved for <a href=\"http:\/\/www.paypal.com\" rel=\"nofollow\">http:\/\/www.paypal.com<\/a>, they will not be provided on a phishing domain like <a href=\"http:\/\/www.paypa1.com\" rel=\"nofollow\">http:\/\/www.paypa1.com<\/a>. This prevents users from unknowingly submitting their passwords to fraudulent sites.<\/p><p class=\"body-md text-primary\">Another layer of protection comes from eliminating the need for manual password entry. Password managers use secure browser APIs or system-level frameworks like Android&#8217;s Autofill API or iOS\u2019s AutoFill to inject credentials directly into login fields. This bypasses keyboard input entirely, preventing phishing websites from capturing credentials through keylogging or fake form fields.<\/p><h2 class=\"heading-xl text-primary\"><b>2. Credential stuffing<\/b><\/h2><p class=\"body-md text-primary\">Credential stuffing is a type of <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/nordpass.com\/blog\/what-is-credential-stuffing\/\" data-ga-slug=\"cyberattack\" data-testid=\"cyberattack-in-na\" data-link-full-refresh=\"true\"><u>cyberattack<\/u><\/a> in which attackers use large sets of stolen username and password combinations, often obtained from previous data breaches, to gain unauthorized access to user accounts on different platforms.\u00a0<\/p><p class=\"body-md text-primary\">For businesses, this is a huge threat\u2014employees reusing personal passwords for work accounts can open the door to attackers who might use a breach of a random website to access corporate emails, CRM systems, or financial tools, costing companies millions in stolen data or ransomware payouts. The attack relies on the assumption that many people will reuse the same credentials across multiple websites and services.\u00a0<\/p><p class=\"body-md text-primary\">Automated tools are used to test these credential pairs across numerous sites at scale, often with the help of bots, enabling attackers to exploit any reused credentials efficiently.<\/p><p><img decoding=\"async\" class=\"\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x896\/5ad52b8822\/asset-5-746x448.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x896\/5ad52b8822\/asset-5-746x448.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x896\/5ad52b8822\/asset-5-746x448.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x896\/5ad52b8822\/asset-5-746x448.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x896\/5ad52b8822\/asset-5-746x448.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x896\/5ad52b8822\/asset-5-746x448.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x896\/5ad52b8822\/asset-5-746x448.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x896\/5ad52b8822\/asset-5-746x448.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x896\/5ad52b8822\/asset-5-746x448.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x896\/5ad52b8822\/asset-5-746x448.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"asset5\" width=\"746\" height=\"448\" data-nimg=\"1\" \/><\/p><p class=\"body-md text-primary\"><br \/>Image: Cybercrime forum discussions focusing on credential-stuffing tools<\/p><p class=\"body-md text-primary\">For example, if an attacker acquires a leaked database from a breached e-commerce platform, they might use the stolen email-password pairs to attempt logins to banking, social media, or other sensitive services. Automated credential stuffing tools, like Sentry MBA or OpenBullet (as seen above), can test thousands of combinations per minute, often evading basic security measures like rate limiting or CAPTCHA using proxies.<\/p><p class=\"body-md text-primary\">Password managers provide a strong defense against credential stuffing by generating and storing unique, complex passwords for every account. Since credential stuffing depends on the reuse of credentials across multiple platforms, having a distinct password for each account renders the attack ineffective. Password managers make this feasible by securely storing and autofilling these unique passwords, so users don\u2019t need to remember them.<\/p><p class=\"body-md text-primary\">NordPass offers a valuable feature called <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/support.nordpass.com\/hc\/en-us\/articles\/360012506958-Password-Health\" data-ga-slug=\"Password Health\" data-testid=\"password-health-in-na\" data-link-full-refresh=\"true\"><u>Password Health<\/u><\/a>. This feature scans all passwords stored in your vault and checks how vulnerable they are, giving you a clear view of your password security. It alerts you about weak, reused, or compromised passwords, helping you take necessary actions to strengthen your online security. This is an effective way to ensure your passwords aren\u2019t putting your accounts at risk.<\/p><h2 class=\"heading-xl text-primary\"><b>3. Brute-force attacks<\/b><\/h2><p class=\"body-md text-primary\">Brute-force attacks involve systematically <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/nordpass.com\/blog\/brute-force-attack\/\" data-ga-slug=\"guessing passwords\" data-testid=\"guessing-passwords-in-na\" data-link-full-refresh=\"true\"><u>guessing passwords<\/u><\/a> by trying all possible combinations, often with the help of automated tools. While most modern consumer platforms include protection mechanisms like two-factor authentication (2FA), CAPTCHA, or account lockouts to prevent these attacks, there are edge cases where brute-force attacks remain viable. This is particularly true for public-facing admin portals or legacy systems that lack built-in protections by default.<\/p><p class=\"body-md text-primary\">For instance, if your business runs a WordPress site without security plugins, it may be leaving its admin panel (\/wp-admin) exposed to brute-force attacks. Attackers might use tools like Hydra or WPScan to test thousands of password combinations, starting with weak or default credentials like admin with password123. Without additional configurations, some versions of these platforms remain vulnerable, as they typically don\u2019t include features like rate limiting or CAPTCHA out of the box. Users must proactively install plugins to secure these areas.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x924\/6a1fb6f28d\/asset-4-746x462.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x924\/6a1fb6f28d\/asset-4-746x462.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x924\/6a1fb6f28d\/asset-4-746x462.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x924\/6a1fb6f28d\/asset-4-746x462.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x924\/6a1fb6f28d\/asset-4-746x462.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x924\/6a1fb6f28d\/asset-4-746x462.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x924\/6a1fb6f28d\/asset-4-746x462.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x924\/6a1fb6f28d\/asset-4-746x462.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x924\/6a1fb6f28d\/asset-4-746x462.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x924\/6a1fb6f28d\/asset-4-746x462.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"asset4\" width=\"746\" height=\"462\" data-nimg=\"1\" \/><\/p><p class=\"body-md text-primary\">Image: An example of WPScan brute-force functionality<\/p><p class=\"body-md text-primary\">Password managers provide an important layer of protection against brute-force attacks by encouraging the use of strong, complex passwords that are resistant to guessing. A password manager can generate a password like Tx8&amp;@K1p!Rv2#, which is more difficult to crack, even with the most advanced brute-force tools. Furthermore, password managers ensure that users don\u2019t rely on weak or default credentials and prevent the reuse of passwords across different systems, which attackers could exploit.<\/p><p class=\"body-md text-primary\">NordPass, in particular, not only generates strong, complex passwords but also stores them securely. Users have the flexibility to determine the complexity of their passwords, allowing them to create passwords that are both highly secure and tailored to their needs. Importantly, NordPass encourages the use of unique passwords for each account, ensuring that even if one set of credentials is exposed, it cannot be used to access other systems.<\/p><p class=\"body-md text-primary\">In addition to generating and securely storing strong passwords, NordPass also includes its built-in <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/nordpass.com\/nordpass-authenticator\/\" data-ga-slug=\"Authenticator feature\" data-testid=\"authenticator-feature-in-na\" data-link-full-refresh=\"true\"><u>Authenticator feature<\/u><\/a>, which can be used as an authenticator app. This adds an extra layer of security by enabling 2FA for your accounts, making it a lot harder for attackers to gain access, even if they manage to crack a password. The NordPass Authenticator is a convenient and secure option to further bolster your defenses against brute-force and other types of attacks.<\/p><p class=\"body-md text-primary\">With a password manager, the only password users need to remember is their master password\u2014the key to unlocking their vault of securely stored credentials. Once this master password is entered, the manager handles the rest, automatically filling in passwords for all other accounts. This removes the burden of remembering each password individually, while still keeping your accounts protected with strong, unique passwords.<\/p><p class=\"body-md text-primary\">Although brute-force attacks are not a genuine risk for most consumers due to modern protections, they still pose a threat in specific scenarios, like unsecured admin portals or systems without rate limiting. By using a password manager to create and store strong, unique passwords, users add an extra layer of defense against this type of attack. In these edge cases, password managers provide protection, ensuring that even if other security layers are missing, accounts are protected with passwords that are resilient to brute-force attempts.<\/p><h2 class=\"heading-xl text-primary\"><b>4. Keyloggers<\/b><\/h2><p class=\"body-md text-primary\">Keyloggers are <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/nordpass.com\/blog\/what-is-keylogger\/\" data-ga-slug=\"malicious tools\" data-testid=\"malicious-tools-in-na\" data-link-full-refresh=\"true\"><u>malicious tools<\/u><\/a> designed to record every keystroke a user types, allowing attackers to steal sensitive information like usernames, passwords, and other private data. Companies can leak important information if keyloggers hit employee devices. They are often deployed as malware through phishing emails, malicious websites, or software downloads, but they can also exist as physical hardware devices installed between a keyboard and a computer.<\/p><p class=\"body-md text-primary\">Software-based keyloggers function by intercepting keyboard inputs at different stages within the operating system. They often utilize API hooks to monitor and record keystrokes as they are being processed.\u00a0<\/p><p class=\"body-md text-primary\">For example, a keylogger on a Windows system might use the SetWindowsHookEx function to intercept keystrokes in real time. This allows it to capture credentials and other private information as they are typed. Clipboard loggers, another variation, monitor copy-paste actions to steal sensitive data like passwords copied for use.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x858\/b065c84305\/asset-3-746x429.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x858\/b065c84305\/asset-3-746x429.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x858\/b065c84305\/asset-3-746x429.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x858\/b065c84305\/asset-3-746x429.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x858\/b065c84305\/asset-3-746x429.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x858\/b065c84305\/asset-3-746x429.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x858\/b065c84305\/asset-3-746x429.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x858\/b065c84305\/asset-3-746x429.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x858\/b065c84305\/asset-3-746x429.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x858\/b065c84305\/asset-3-746x429.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"asset3\" width=\"746\" height=\"429\" data-nimg=\"1\" \/><\/p><p class=\"body-md text-primary\">Image: Guides being shared on a cybercrime forum on how to write keyloggers<\/p><p class=\"body-md text-primary\">Password managers effectively counter these risks by eliminating the need for manual password entry. Instead of requiring users to type their passwords, password managers use secure autofill mechanisms to directly input credentials into login fields. On web browsers, they inject credentials through direct interaction with the DOM, while on mobile devices, they use system-level frameworks like Android\u2019s Autofill API or iOS\u2019s AutoFill. These methods bypass the keyboard entirely, rendering keyloggers unable to capture any useful data during the login process.<\/p><p class=\"body-md text-primary\">Although a keylogger could potentially capture the master password during the initial login to the password manager, modern password managers mitigate part of this risk by minimizing the need for repeated master password entry. Many password managers support biometric authentication, like fingerprint or facial recognition, allowing users to unlock the manager without typing anything after the initial login. Biometric data is securely stored on the device and cannot be intercepted by keyloggers, making it a highly secure and convenient method of authentication.<\/p><h2 class=\"heading-xl text-primary\"><b>5. Database leaks<\/b><\/h2><p class=\"body-md text-primary\">Database leaks occur when attackers gain <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/nordpass.com\/blog\/how-do-hackers-get-passwords\/\" data-ga-slug=\"unauthorized access\" data-testid=\"unauthorized-access-in-na\" data-link-full-refresh=\"true\"><u>unauthorized access<\/u><\/a> to databases storing sensitive user information, such as usernames, passwords, and personal details. Businesses face huge losses when customer data spills out. These leaks often happen due to issues like web-application vulnerabilities, misconfigured servers, or outdated software.\u00a0<\/p><p class=\"body-md text-primary\">Once a database is leaked, attackers can use the stolen credentials in further attacks, like credential stuffing (as mentioned above) or direct account takeovers, particularly if the passwords are weak or reused across multiple accounts.<\/p><p class=\"body-md text-primary\">For example, in a typical breach, a compromised database may store passwords in plain text or use weak hashing algorithms like MD5 or SHA-1, which are vulnerable to tools like Hashcat.\u00a0<\/p><p class=\"body-md text-primary\">Hashcat, a high-performance password-cracking tool, allows attackers or researchers to brute-force or perform <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/nordpass.com\/blog\/what-is-data-leak\/\" data-ga-slug=\"dictionary attacks\" data-testid=\"dictionary-attacks-in-na\" data-link-full-refresh=\"true\"><u>dictionary attacks<\/u><\/a> on leaked password hashes to recover plaintext passwords. Even strong passwords can become vulnerable if the hashing algorithm is outdated or poorly implemented (e.g., missing salting).<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x936\/a230eff8ea\/asset-6-746x468.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x936\/a230eff8ea\/asset-6-746x468.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x936\/a230eff8ea\/asset-6-746x468.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x936\/a230eff8ea\/asset-6-746x468.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x936\/a230eff8ea\/asset-6-746x468.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x936\/a230eff8ea\/asset-6-746x468.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x936\/a230eff8ea\/asset-6-746x468.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x936\/a230eff8ea\/asset-6-746x468.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x936\/a230eff8ea\/asset-6-746x468.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x936\/a230eff8ea\/asset-6-746x468.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"asset6\" width=\"746\" height=\"468\" data-nimg=\"1\" \/><\/p><p class=\"body-md text-primary\">Image: A researcher or cybercriminal trying to use Hashcat to crack passwords<\/p><p class=\"body-md text-primary\">Password managers protect users from the consequences of database leaks in several key ways. First, they encourage the use of unique, strong passwords for every account. This ensures that even if one set of credentials is exposed in a breach, it cannot be used to access other accounts. For example, a leaked password from an e-commerce site would not provide access to a user\u2019s banking or email accounts if unique credentials were used.<\/p><p class=\"body-md text-primary\">In addition to promoting password uniqueness, password managers generate and store randomized passwords that are resistant to brute-force attacks. A password like T&amp;$9jf@3#1Px2! is much harder to crack using tools like Hashcat compared to common or weak passwords. Password managers also make it easy to update compromised passwords quickly by identifying affected accounts and help in generating secure replacements.<\/p><p class=\"body-md text-primary\">Many password managers further enhance protection by integrating breach monitoring tools. For example, NordPass offers an integrated <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"http:\/\/nordpass.com\/features\/password-breach-report\/\" data-ga-slug=\"Data Breach Scanner\" data-testid=\"data-breach-scanner-in-na\" data-link-full-refresh=\"true\"><u>Data Breach Scanner<\/u><\/a> that provides real-time alerts when your email or credit card details appear in a data breach or leak. This feature allows you to respond proactively by updating your credentials before attackers can exploit the compromised data.<\/p><p class=\"body-md text-primary\">NordPass follows a zero-knowledge architecture, meaning it never has access to user passwords. Additionally, NordPass provides businesses with a <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/go.nordpass.io\/aff_c?offer_id=943&amp;aff_id=107243&amp;url_id=29808\" data-ga-slug=\"free tool\" data-testid=\"free-tool-in-na\" data-link-full-refresh=\"true\"><u>free tool<\/u><\/a> to check for potential leaks through its dark web monitoring service. This service helps companies detect any exposed employee or customer data across the dark web, adding an essential layer of defense for businesses concerned about database breaches.<\/p><h2 class=\"heading-xl text-primary\"><b>Get protection with NordPass<\/b><\/h2><p class=\"body-md text-primary\">Credential theft can cause serious problems for businesses of all sizes. When someone\u2019s login details are stolen, it can lead to unauthorized access to accounts, financial scams, identity theft, or even corporate spying. Hackers often sell stolen login details on dark web marketplaces, making them available to criminals around the world.<\/p><p class=\"body-md text-primary\">If a hacker gets into someone\u2019s email, they can reset passwords for other accounts, giving them access to even more services. To protect against credential theft and its harmful effects, it\u2019s important to use strong passwords and a password manager.<\/p><p class=\"body-md text-primary\">Start taking control of your security today. As a business owner, you have the power to strengthen your company\u2019s defenses by mandating the use of a password manager. NordPass Business makes it easy to implement best practices across your team, protecting against the very threats we\u2019ve discussed.\u00a0<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1492x852\/965c7c9b59\/asset-1-746x426.png\/m\/1200x0\/filters:quality(60):format(avif)\" sizes=\"(max-width: 376px) 100vw, (max-width: 743px) 60vw, (max-width: 1129px) 50vw, 40vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/1492x852\/965c7c9b59\/asset-1-746x426.png\/m\/256x0\/filters:quality(60):format(avif) 256w, https:\/\/a.storyblok.com\/f\/157611\/1492x852\/965c7c9b59\/asset-1-746x426.png\/m\/360x0\/filters:quality(60):format(avif) 360w, https:\/\/a.storyblok.com\/f\/157611\/1492x852\/965c7c9b59\/asset-1-746x426.png\/m\/384x0\/filters:quality(60):format(avif) 384w, https:\/\/a.storyblok.com\/f\/157611\/1492x852\/965c7c9b59\/asset-1-746x426.png\/m\/430x0\/filters:quality(60):format(avif) 430w, https:\/\/a.storyblok.com\/f\/157611\/1492x852\/965c7c9b59\/asset-1-746x426.png\/m\/640x0\/filters:quality(60):format(avif) 640w, https:\/\/a.storyblok.com\/f\/157611\/1492x852\/965c7c9b59\/asset-1-746x426.png\/m\/750x0\/filters:quality(60):format(avif) 750w, https:\/\/a.storyblok.com\/f\/157611\/1492x852\/965c7c9b59\/asset-1-746x426.png\/m\/828x0\/filters:quality(60):format(avif) 828w, https:\/\/a.storyblok.com\/f\/157611\/1492x852\/965c7c9b59\/asset-1-746x426.png\/m\/1080x0\/filters:quality(60):format(avif) 1080w, https:\/\/a.storyblok.com\/f\/157611\/1492x852\/965c7c9b59\/asset-1-746x426.png\/m\/1200x0\/filters:quality(60):format(avif) 1200w\" alt=\"asset1\" width=\"746\" height=\"462\" data-nimg=\"1\" \/><\/p><p class=\"body-md text-primary\">NordPass also constantly passes security audits, ensuring it meets the highest levels of protection. This helps your business achieve information security standard compliance (like <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/nordpass.com\/iso-standard\/\" data-ga-slug=\"ISO\" data-testid=\"iso-in-na\" data-link-full-refresh=\"true\"><u>ISO<\/u><\/a> and <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/nordpass.com\/nis-2-directive\/\" data-ga-slug=\"NIS2\" data-testid=\"nis2-in-na\" data-link-full-refresh=\"true\"><u>NIS2<\/u><\/a>), which protects against high penalties for non-compliance and potential data leaks.<\/p><p class=\"body-md text-primary\">Get started with a complimentary 3-month trial by <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out underline text-success hover:text-primary active:text-success focus-visible:text-green-900\" href=\"https:\/\/nordpass.com\/content-creator-business\/danielk?coupon=danielk&amp;utm_medium=affiliate&amp;utm_term&amp;utm_content&amp;utm_campaign=off502&amp;utm_source=aff107243&amp;aff_free\" data-ga-slug=\"clicking here\" data-testid=\"clicking-here-in-na\" data-link-full-refresh=\"true\"><u>clicking here<\/u><\/a> and using the code \u201cdanielk\u201d\u2014no credit card required. Don\u2019t wait until it\u2019s too late; secure your business now.<\/p><p class=\"body-md text-primary\">Disclaimer: Examples are provided for informational and educational purposes only. NordPass does not endorse, promote, or support their use and has no affiliation with them. Readers are strongly advised to comply with all applicable laws and regulations. All trademarks mentioned are the property of their respective owners.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>When you think of a password manager, you probably thin [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1129,1305,61],"tags":[974,1077,1131],"class_list":["post-111734","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordpass","category-1305","category-press-release","tag-nord-security","tag-1077","tag-nordpass"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI is now being used to guess your business passwords - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI is now being used to guess your business passwords - Version 2\" \/>\n<meta property=\"og:description\" content=\"When you think of a password manager, you probably thin [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-23T08:57:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/444ad3f993\/5-cyber-threats-1062x597-1.png\/m\/828x0\/filters:quality(60):format(avif)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/threats-password-managers-protect-against\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/05\\\/ai-is-now-being-used-to-guess-your-business-passwords\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"AI is now being used to guess your business passwords\",\"datePublished\":\"2025-05-23T08:57:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/05\\\/ai-is-now-being-used-to-guess-your-business-passwords\\\/\"},\"wordCount\":2342,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/threats-password-managers-protect-against\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/444ad3f993\\\/5-cyber-threats-1062x597-1.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\",\"keywords\":[\"Nord Security\",\"2025\",\"NordPass\"],\"articleSection\":[\"Nord Security\",\"NordPass\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/05\\\/ai-is-now-being-used-to-guess-your-business-passwords\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/threats-password-managers-protect-against\\\/\",\"name\":\"AI is now being used to guess your business passwords - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/threats-password-managers-protect-against\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/threats-password-managers-protect-against\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/444ad3f993\\\/5-cyber-threats-1062x597-1.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\",\"datePublished\":\"2025-05-23T08:57:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/threats-password-managers-protect-against\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/threats-password-managers-protect-against\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/threats-password-managers-protect-against\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/444ad3f993\\\/5-cyber-threats-1062x597-1.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/2124x1194\\\/444ad3f993\\\/5-cyber-threats-1062x597-1.png\\\/m\\\/828x0\\\/filters:quality(60):format(avif)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/threats-password-managers-protect-against\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI is now being used to guess your business passwords\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI is now being used to guess your business passwords - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/","og_locale":"zh_HK","og_type":"article","og_title":"AI is now being used to guess your business passwords - Version 2","og_description":"When you think of a password manager, you probably thin [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/","og_site_name":"Version 2","article_published_time":"2025-05-23T08:57:01+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/444ad3f993\/5-cyber-threats-1062x597-1.png\/m\/828x0\/filters:quality(60):format(avif)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"8 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/05\/ai-is-now-being-used-to-guess-your-business-passwords\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"AI is now being used to guess your business passwords","datePublished":"2025-05-23T08:57:01+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/05\/ai-is-now-being-used-to-guess-your-business-passwords\/"},"wordCount":2342,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/444ad3f993\/5-cyber-threats-1062x597-1.png\/m\/828x0\/filters:quality(60):format(avif)","keywords":["Nord Security","2025","NordPass"],"articleSection":["Nord Security","NordPass","2025","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/05\/ai-is-now-being-used-to-guess-your-business-passwords\/","url":"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/","name":"AI is now being used to guess your business passwords - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/444ad3f993\/5-cyber-threats-1062x597-1.png\/m\/828x0\/filters:quality(60):format(avif)","datePublished":"2025-05-23T08:57:01+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/444ad3f993\/5-cyber-threats-1062x597-1.png\/m\/828x0\/filters:quality(60):format(avif)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/2124x1194\/444ad3f993\/5-cyber-threats-1062x597-1.png\/m\/828x0\/filters:quality(60):format(avif)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/threats-password-managers-protect-against\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"AI is now being used to guess your business passwords"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-t4a","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/111734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=111734"}],"version-history":[{"count":1,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/111734\/revisions"}],"predecessor-version":[{"id":111738,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/111734\/revisions\/111738"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=111734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=111734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=111734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}