Whereas IT groups make investments closely in login safety, many don’t apply the identical scrutiny to password resets. If the reset path is weaker than the authentication path, it turns into the logical goal.
As soon as an attacker beneficial properties a foothold, their subsequent step is resetting credentials tied to extra helpful accounts. A poorly protected reset course of can permit them to maneuver by means of a community and assume larger privileges whereas mixing in as a respectable person.
Understanding the dangers behind password resets is essential, so we have a look at how attackers use password resets to escalate privileges and establish seven sensible methods to shut these gaps with out slowing your workforce down.
How attackers escalate privileges by means of password resets
In lots of environments, the reset course of sits barely exterior the strong controls utilized to regular authentication. Relatively than attempting to interrupt by means of hardened login defenses, attackers search for reset paths which are simpler to control. Widespread escalation paths embrace:
Compromised normal accounts: An attacker beneficial properties entry to a low-privilege person, then explores reset choices for higher-value accounts. That is particularly harmful the place helpdesk instruments or loosely scoped admin rights permit lateral motion.
Helpdesk social engineering: Attackers impersonate staff, declare they’re locked out, and push for pressing resets. Underneath stress, inconsistent id verification can result in entry being handed over.
Reset token interception: If electronic mail accounts are compromised, multi-factor authentication (MFA) depends on SMS, or restoration settings are misconfigured, attackers can seize reset hyperlinks or one-time codes with out understanding the unique password.
Abuse of over-permissioned admins: Customers with broad reset rights can, deliberately or in any other case, change credentials for accounts past their function, creating an escalation alternative.
Verizon’s Information Breach Investigation Report discovered stolen credentials are concerned in 44.7% of breaches.
Effortlessly safe Lively Listing with compliant password insurance policies, blocking 4+ billion compromised passwords, boosting safety, and slashing help hassles!
Strive it free of charge
Seven methods to safe password resets
1. Require MFA
MFA is without doubt one of the best controls in opposition to privilege escalation by means of password resets. Requiring MFA for reset requests must be a baseline safeguard in any reset workflow. Nevertheless, not all MFA strategies supply the identical stage of safety. MFA options like codes despatched through electronic mail and SMS aren’t infallible.
For prime-value or administrative accounts, phishing-resistant MFA (similar to FIDO2 or hardware-backed authentication) supplies stronger safety in opposition to token interception. It reduces the effectiveness of token interception, SIM swapping, and credential phishing.
2. Strengthen machine safety
Password resets initiated from unmanaged or unknown gadgets create pointless publicity. Compromised endpoints, private gadgets, or periods originating from uncommon places all improve threat.
The place potential, restrict reset approvals to trusted, managed gadgets and apply machine posture checks. Block or step up verification for requests coming from new geographies or high-risk IPs. Id alone isn’t sufficient. MFA validates the person’s id, not the safety posture of the machine.
3. Implement sturdy password insurance policies
Password resets solely enhance safety if the brand new password is definitely sturdy. Organizations ought to implement clear minimal size necessities, block frequent or breached passwords, and stop customers from recycling outdated credentials.
Complexity guidelines may help, however overly inflexible necessities result in predictable patterns and pissed off customers. Passphrases alleviate this difficulty, as they’re more durable to crack and simpler for workers to recollect.
Options like Specops Password Coverage assist organizations apply stronger, extra granular password necessities than these obtainable by means of Microsoft’s native insurance policies. It additionally constantly blocks greater than 5.4 billion identified compromised passwords by means of the Breached Password Safety function, decreasing the prospect of attackers abusing respectable credentials.

4. Educate customers and help groups
Password resets are a frequent phishing goal as a result of attackers know urgency lowers warning. Practice staff to acknowledge reset scams, suspicious MFA prompts, and surprising restoration emails.
Helpdesk groups additionally want constant id verification procedures. Even in environments with self-service resets, a rushed approval can rapidly turn out to be a privilege escalation path.
5. Run common audits and monitor reset exercise
Organizations ought to log and evaluate reset requests, particularly privileged accounts. Groups ought to monitor and have alerts for uncommon patterns similar to repeated makes an attempt, out-of-hours exercise, or resets coming from surprising places.
It’s additionally necessary to frequently audit who has permission to reset passwords for others. Overly broad entry can create escalation alternatives that go unnoticed till exploited.
6. Implement least privilege
Making use of least privilege helps restrict escalation by guaranteeing customers, together with directors, solely have the permissions required for his or her function. That features proscribing who can reset passwords for others and separating high-privilege accounts from on a regular basis person exercise.
Privileged entry must be tightly scoped, time-bound the place potential, and frequently reviewed. The less alternatives attackers have to leap from one account to a different, the more durable it’s for one reset to escalate into full administrative management.
7. Keep away from knowledge-based authentication
Safety questions and different “something you know” checks are not a dependable method to defend password resets. Solutions are simpler to guess as folks share extra details about themselves on social media. Use possession-based verification as a substitute, similar to safe MFA prompts or checks tied to trusted gadgets.
It’s right here that Specops’ zero belief entry answer Infinipoint helps by binding person identities to trusted gadgets, guaranteeing that authentication solely succeeds from authorized, enrolled gadgets.
How Specops may help
Securing password resets means defending the total account lifecycle, from restoration by means of to ongoing monitoring. We assist organizations scale back privilege escalation threat by strengthening reset workflows by means of Specops uReset.
Distant customers can change their password from any location and at any time of day, whether or not on or off VPN. A number of authentication choices assure customers can full resets even when one id supplier is unavailable.

Our id safety merchandise are designed to help IT groups with the experience wanted to maintain entry safe with out including pointless friction.
If you happen to’d wish to see how Specops may help safe your password resets, contact us in the present day or ebook a demo to see our options in motion.
Sponsored and written by Specops Software program.



