Tech News
← Back to articles

How generative AI accelerates identity attacks against Active Directory

read original related products more articles

Active Directory is still how most organizations manage user identities, making it a frequent focus during attacks. What’s changed isn’t the target, but how much faster and more effective these attacks have become.

Generative AI has made password attacks cheaper and more efficient, turning what once required specialized skills and significant computing power into something almost anyone can do.

AI-powered password attacks are already in use

Tools like PassGAN represent a new generation of password crackers that don't rely on static wordlists or brute-force randomness. Through adversarial training, the system learns patterns in how people actually create passwords and improves at predicting them with each iteration.

The results are sobering. Recent research found that PassGAN was able to crack 51% of common passwords in under a minute and 81% within a month. Even more concerning is how quickly these models are evolving.

When trained on organization-specific breach data, social media content, or publicly available company websites, they can generate highly targeted password candidates that reflect actual employee behavior.

How generative AI changes password attack techniques

Traditional password attacks followed predictable patterns. Attackers used dictionary wordlists, then applied rule-based mutations (e.g., swapping "a" for "@", adding "123" to the end), and hoped for matches. It was a resource-intensive and relatively slow process.

However, AI-powered attacks are different:

Pattern recognition at scale: Machine learning models identify subtle patterns in how people construct passwords, including common substitutions, keyboard patterns, and how they integrate personal information, generating guesses that mirror these behaviors. Instead of testing millions of random combinations, AI focuses on a hacker’s computational power on the most probable candidates.

... continue reading