Friday, January 24, 2025
HomeCyber Security News‘123456’ Crackable in seconds, 2023's Most Prevalent Password

‘123456’ Crackable in seconds, 2023’s Most Prevalent Password

Published on

SIEM as a Service

Follow Us on Google News

For half a decade, NordPass has delved into the realm of password habits, uncovering familiar tunes that persist. 

However, this year’s narrative is layered with intriguing patterns, particularly within distinct platform categories. 

Amidst the discourse on passkeys, a question lingers: Is there a superior approach to user authentication? Here’s the compilation of the most common passwords, unraveling trends and pondering the future of passkeys.

The research, conducted in collaboration with cybersecurity experts, dissected a vast 4.3TB database drawn from diverse sources, including the enigmatic dark web. 

Emphasizing privacy, no personal data was procured for this study. 

Covering up to 35 countries, the study meticulously categorized data into eight platform types, offering statistical insights without compromising user privacy.

The Alarming Rankings on top 5 commonly used passwords

  1. ‘123456’  A staggering 4,524,867 instances.
  2. ‘admin’ Commanding 4,008,850 occurrences.
  3. ‘12345678’ was swiftly breached in less than a second, with 1,371,152 cases.
  4. ‘123456789’ Another under-a-second victim, appearing 1,213,047 times.
  5. ‘1234’ Sub-second vulnerability was identified 969,811 times.

Collaborating with third-party researchers, NordPass scrutinized stolen passwords from a 6.6TB database, shedding light on the most popular passwords per platform category. 

From the widespread “password” to the seemingly secure “P@ssw0rd,” the findings offer a comprehensive view of user habits across various digital landscapes.

Document
Free Webinar

Live API Attack Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

The Password Predicament

As the list unfolds, it’s evident that certain passwords persist as favorites, raising cybersecurity concerns. 

Researchers note that while evolving technologies bolster password security, malware attacks remain a significant threat to account integrity.

Statistics reveal alarming facts about password vulnerabilities:

  • 86% of web app attacks deploy stolen credentials (Source: Verizon)
  • 18% of dark web offerings include online accounts, emails, and passwords (Source: NordVPN.com)
  • 24 billion credentials breached since 2016 (Source: Reliaquest.com)
  • The average user juggles around 100 passwords (Source: NordPass)

Passkeys – A Beacon of Security

Amid the labyrinth of weak passwords, passkeys emerge as the beacon of hope. 

Based on FIDO standards, NordPass champions passkey technology, paving the way for a secure and seamless online experience. 

The transition towards passkeys is inevitable, and credential managers play a pivotal role in navigating this evolution.

Executive Director & CMO of FIDO Alliance, Andrew Shikiar, emphasizes the urgency for users to fortify their password hygiene. 

Credential managers, like NordPass, not only enhance security but also guide individuals and businesses in embracing passkeys – the future of online protection.

Safeguarding Your Digital Fortress

In a landscape riddled with vulnerabilities, the fundamentals of password safety become paramount:

  • Craft complex passwords with a minimum of 20 characters, incorporating a mix of uppercase and lowercase letters, numbers, and symbols.
  • Steer clear of password reuse across multiple sites, minimizing the risk of a widespread compromise.
  • Regularly assess password health, identifying and updating weak or reused passwords for a fortified online experience.
  • Embrace the assistance of a password manager, a stalwart ally in the battle for digital security.

Experience how StorageGuard eliminates the security blind spots in your storage systems, try a 14-day free trial.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

HellCat and Morpheus Ransomware Share Identical Payloads for Attacks

The cybersecurity landscape witnessed a surge in ransomware activity during the latter half of...

370+ Ivanti Connect Secure Exploited Using 0-Day Vulnerability

A major cybersecurity incident has come to light, with more than 370 Ivanti Connect...

BASHE Ransomware Allegedly Leaked ICICI Bank Customers Data

A major cyber threat looms over Indian financial giant ICICI Bank as the notorious...

North Korean IT Workers Steal Companies Source Codes to Demand Ransomware

The Federal Bureau of Investigation (FBI) has issued fresh warnings about malicious activities by...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

370+ Ivanti Connect Secure Exploited Using 0-Day Vulnerability

A major cybersecurity incident has come to light, with more than 370 Ivanti Connect...

BASHE Ransomware Allegedly Leaked ICICI Bank Customers Data

A major cyber threat looms over Indian financial giant ICICI Bank as the notorious...

North Korean IT Workers Steal Companies Source Codes to Demand Ransomware

The Federal Bureau of Investigation (FBI) has issued fresh warnings about malicious activities by...