‘123456’ Crackable in seconds, 2023’s Most Prevalent Password

For half a decade, NordPass has delved into the realm of password habits, uncovering familiar tunes that persist. 

However, this year’s narrative is layered with intriguing patterns, particularly within distinct platform categories. 

Amidst the discourse on passkeys, a question lingers: Is there a superior approach to user authentication? Here’s the compilation of the most common passwords, unraveling trends and pondering the future of passkeys.

The research, conducted in collaboration with cybersecurity experts, dissected a vast 4.3TB database drawn from diverse sources, including the enigmatic dark web. 

Emphasizing privacy, no personal data was procured for this study. 

Covering up to 35 countries, the study meticulously categorized data into eight platform types, offering statistical insights without compromising user privacy.

The Alarming Rankings on top 5 commonly used passwords

  1. ‘123456’  A staggering 4,524,867 instances.
  2. ‘admin’ Commanding 4,008,850 occurrences.
  3. ‘12345678’ was swiftly breached in less than a second, with 1,371,152 cases.
  4. ‘123456789’ Another under-a-second victim, appearing 1,213,047 times.
  5. ‘1234’ Sub-second vulnerability was identified 969,811 times.

Collaborating with third-party researchers, NordPass scrutinized stolen passwords from a 6.6TB database, shedding light on the most popular passwords per platform category. 

From the widespread “password” to the seemingly secure “P@ssw0rd,” the findings offer a comprehensive view of user habits across various digital landscapes.

Document
Free Webinar

Live API Attack Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

The Password Predicament

As the list unfolds, it’s evident that certain passwords persist as favorites, raising cybersecurity concerns. 

Researchers note that while evolving technologies bolster password security, malware attacks remain a significant threat to account integrity.

Statistics reveal alarming facts about password vulnerabilities:

  • 86% of web app attacks deploy stolen credentials (Source: Verizon)
  • 18% of dark web offerings include online accounts, emails, and passwords (Source: NordVPN.com)
  • 24 billion credentials breached since 2016 (Source: Reliaquest.com)
  • The average user juggles around 100 passwords (Source: NordPass)

Passkeys – A Beacon of Security

Amid the labyrinth of weak passwords, passkeys emerge as the beacon of hope. 

Based on FIDO standards, NordPass champions passkey technology, paving the way for a secure and seamless online experience. 

The transition towards passkeys is inevitable, and credential managers play a pivotal role in navigating this evolution.

Executive Director & CMO of FIDO Alliance, Andrew Shikiar, emphasizes the urgency for users to fortify their password hygiene. 

Credential managers, like NordPass, not only enhance security but also guide individuals and businesses in embracing passkeys – the future of online protection.

Safeguarding Your Digital Fortress

In a landscape riddled with vulnerabilities, the fundamentals of password safety become paramount:

  • Craft complex passwords with a minimum of 20 characters, incorporating a mix of uppercase and lowercase letters, numbers, and symbols.
  • Steer clear of password reuse across multiple sites, minimizing the risk of a widespread compromise.
  • Regularly assess password health, identifying and updating weak or reused passwords for a fortified online experience.
  • Embrace the assistance of a password manager, a stalwart ally in the battle for digital security.

Experience how StorageGuard eliminates the security blind spots in your storage systems, try a 14-day free trial.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…

8 hours ago

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…

8 hours ago

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…

8 hours ago

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…

8 hours ago

Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner

Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…

2 days ago

A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…

2 days ago