US-CERT issues first security alert outlining the risks of leaving default passwords in place. The Department of Homeland Security’s National Cybersecurity and Communications Integration Center operation’s warning was not in response to any new breaches or attacks. The vendor-default passwords are often publicly documented, and attackers can find systems using the defaults via Shodan searches or other scanning methods. The alert points to recent attacks that preyed on default passwords, such as the Carna botnet; the phony emergency alert on “zombies;” Stuxnet.”]
Source: https://www.darkreading.com/attacks-breaches/us-cert-warns-of-default-password-risks

