GITNUXREPORT 2026

Password Breach Statistics

Major data breaches compromise billions of passwords, causing immense financial and security damage.

Alexander Schmidt

Alexander Schmidt

Research Analyst specializing in technology and digital transformation trends.

First published: Feb 13, 2026

Our Commitment to Accuracy

Rigorous fact-checking · Reputable sources · Regular updatesLearn more

Key Statistics

Statistic 1

In the 2013 Yahoo data breach, approximately 3 billion user accounts were compromised, including names, email addresses, phone numbers, birthdates, encrypted passwords, and security questions, marking it as the largest known breach to date

Statistic 2

The 2016 MySpace breach exposed 360 million accounts with usernames, email addresses, and salted MD5 password hashes, occurring due to a server misconfiguration

Statistic 3

LinkedIn's 2012 breach affected 167 million accounts, leaking email addresses and unsalted SHA-1 password hashes, which were later cracked for over 90% of them

Statistic 4

Adobe's 2013 breach compromised 153 million customer records including usernames, encrypted passwords, and credit card details partially, via SQL injection

Statistic 5

The 2014 eBay breach impacted 145 million users, exposing names, addresses, emails, and encrypted passwords from a compromised employee account

Statistic 6

Dropbox's 2012 incident involved 68 million accounts with emails and hashed passwords dumped from a third-party breach

Statistic 7

Tumblr's 2013 breach leaked 65 million usernames and SHA-1 hashed passwords due to an unsecured backup file

Statistic 8

The RockYou 2009 breach revealed 32 million plaintext passwords from a gaming site, providing a massive dictionary for cracking

Statistic 9

NetEase 2015 breach affected 235 million accounts with emails and MD5 hashed passwords from Chinese gaming firm

Statistic 10

Canva's 2019 breach compromised 139 million accounts including emails, names, and salted bcrypt passwords

Statistic 11

The 2021 Facebook breach exposed 533 million users' phone numbers, IDs, names, and emails from a 2019 scraping

Statistic 12

Twitter's 2022 breach involved 200 million emails and phone numbers scraped via API vulnerability

Statistic 13

Equifax 2017 breach affected 147 million with SSNs, DOBs, addresses, and some driver licenses via Apache Struts exploit

Statistic 14

Marriott's Starwood 2018 breach impacted 500 million guests with passports, payment info, and contacts over 4 years

Statistic 15

Capital One 2019 breach exposed 106 million application data including SSNs and bank details via AWS misconfig

Statistic 16

First American Financial 2019 leak exposed 885 million file records with bank accounts and SSNs publicly accessible

Statistic 17

Zynga 2019 breach hit 218 million with Facebook login credentials from Words with Friends

Statistic 18

000webhost 2015 breach leaked 15 million accounts with emails and plaintext passwords

Statistic 19

AdultFriendFinder 2016 breach compromised 412 million accounts with emails, usernames, and MD5 passwords

Statistic 20

Last.fm 2012 breach affected 43 million with usernames and MD5 passwords

Statistic 21

Badoo 2013 breach exposed 109 million with names, emails, DOBs, and locations

Statistic 22

Timehop 2018 breach impacted 21 million with names, emails, and phone numbers

Statistic 23

MyFitnessPal 2018 breach hit 150 million users with emails and bcrypt passwords

Statistic 24

Apollo.io 2021 breach leaked 250,000 records with company data and emails

Statistic 25

Parler 2021 scrape exposed 70 million posts and user data post-Jan 6

Statistic 26

VeriSign 2019 breach affected 235 million with domains and emails discovered in 2021

Statistic 27

Snapchat 2014 breach leaked 4.6 million usernames and phone numbers

Statistic 28

Ashley Madison 2015 breach exposed 37 million adulterers' details including emails and preferences

Statistic 29

Sony Pictures 2014 breach leaked 47,000 SSNs, salaries, and emails via malware

Statistic 30

Neopets 2016 breach compromised 69 million accounts with emails and passwords

Statistic 31

Average time to identify a breach is 204 days, with 28% involving credentials per IBM 2023 Cost of Data Breach

Statistic 32

Mean time to contain a credential breach is 73 days per IBM 2023 report across industries

Statistic 33

Verizon 2023 DBIR: 49% of breaches detected by third parties, often after password dumps surface

Statistic 34

Mandiant M-Trends 2023: Median dwell time for credential abusers is 16 days, down from 24

Statistic 35

Ponemon 2023: Organizations using MFA reduce detection time for password breaches by 50%

Statistic 36

CrowdStrike 2023: 75% of breaches involved initial access via compromised passwords undetected for weeks

Statistic 37

Microsoft 2023: Password spray attacks take average 2 weeks to detect in enterprises

Statistic 38

Rapid7 2023: Credential stuffing incidents average 11 days from attack to alert

Statistic 39

Splunk 2023: 60% of password breaches go undetected over 90 days without SIEM

Statistic 40

Darktrace 2023: AI detects password anomalies in 1 hour vs 7 days manual

Statistic 41

Palo Alto 2023: Ransomware post-password breach median 14 days to encryption

Statistic 42

IBM X-Force 2023: Initial credential compromise to lateral movement averages 5 days

Statistic 43

Accenture 2023: 37% of breaches notified after 6 months due to slow password monitoring

Statistic 44

EY 2023: Financial firms average 277 days MTTD for credential breaches

Statistic 45

KPMG 2023: Detection time for insider password misuse averages 100 days

Statistic 46

Deloitte 2023: 55% of orgs take over month to respond to password stuffing alerts

Statistic 47

McAfee 2023: Mobile password breaches detected in 3 days vs 21 for desktop

Statistic 48

Sophos 2023: Ransomware dwell time post-password access 8 days average

Statistic 49

Trend Micro 2023: APAC firms average 240 days to detect password breaches

Statistic 50

FireEye (Mandiant) 2022: Nation-state password ops undetected for 21 days median

Statistic 51

Cost of a data breach averaged $4.45 million in 2023, with credential compromise adding $1.2M extra per IBM

Statistic 52

Weak credentials contribute to 20% higher breach costs, averaging $5.0M total per IBM 2023

Statistic 53

Ponemon 2023 estimates password reset post-breach costs orgs $50 per user affected

Statistic 54

Verizon DBIR 2023: Breaches costing over $1M 60% involve stolen passwords

Statistic 55

Average ransomware payout post-password breach $1.54M per Sophos 2023

Statistic 56

Lost productivity from password breach remediation averages $1.5M per IBM X-Force

Statistic 57

Notification costs post-breach average $0.25-$3 per record with passwords exposed, per BakerHostetler

Statistic 58

Stock drops 7.5% average after major password breach announcements per Ponemon

Statistic 59

Customer churn post-password breach 15-20% higher costing $2.5M avg per UpGuard

Statistic 60

Legal fines for GDPR password breaches average €1.2M per case in 2023

Statistic 61

Incident response retainers for password breaches cost $500-$1000/hour per firm

Statistic 62

MFA implementation post-breach saves $1.3M avg per IBM 2023 lifecycle costs

Statistic 63

Dark web sale of breached passwords fetches $10-100 per premium account per Flashpoint

Statistic 64

Business interruption from password outage averages $8K/minute per Ponemon

Statistic 65

Insurance premiums rise 25% post-password breach claims per CyberCube 2023

Statistic 66

Reputation damage from breaches costs $1.4M additional per year per Ponemon

Statistic 67

Free credit monitoring for 1 year post-breach costs $10/user avg

Statistic 68

Global average breach cost $4.45M, US $9.44M with credentials highest at $5.13M per IBM

Statistic 69

Small biz password breaches cost $25K avg but lead to 60% closure rate per SBA

Statistic 70

Enterprise password manager savings $50/user/year vs breach costs per Gartner

Statistic 71

In healthcare, 25% of breaches in 2022 involved weak passwords per HHS OCR data

Statistic 72

Financial services saw 18% of breaches due to credential compromise in Verizon 2023 DBIR, affecting banks heavily

Statistic 73

Retail sector had 29% of breaches from stolen credentials in IBM 2023 Cost of Data Breach report

Statistic 74

In education, 35% of incidents involved password breaches per Educause 2023 survey

Statistic 75

Tech industry accounts for 22% of all major breaches tracked by HIBP with password dumps

Statistic 76

Gaming sector breaches like Sony PSN 2011 affected 77 million with passwords and CC details

Statistic 77

Government agencies reported 15% rise in password breaches in 2022 per GAO report

Statistic 78

Energy/utilities had average breach cost $4.95M with 40% from credentials per IBM 2023

Statistic 79

Hospitality like Marriott saw 500M guest records breached, 60% password related per analysis

Statistic 80

Manufacturing sector 28% of breaches credential stuffing per Ponemon 2023

Statistic 81

Pharma industry 32% breaches from weak passwords in 2022 HHS data

Statistic 82

Transportation sector 20% increase in password incidents per Verizon 2023 DBIR

Statistic 83

Media/entertainment like Sony Pictures 47K SSNs via password phishing precursor

Statistic 84

Non-profits 25% breaches credential-based per IBM Cost report 2023

Statistic 85

Telecom breaches like T-Mobile 2021 54M affected by API password flaws

Statistic 86

E-commerce 40% of breaches involve reused passwords per RiskBased 2023

Statistic 87

Legal services 22% password compromise rate in 2022 per ABA cybersecurity report

Statistic 88

Construction industry 30% breaches from stolen creds per Verizon DBIR 2023

Statistic 89

Insurance sector average 290 days to identify password breach per IBM 2023

Statistic 90

Public admin 18% of state breaches password related per MS-ISAC 2023

Statistic 91

Automotive like CDK Global 2024 ransomware hit passwords for 15K dealers

Statistic 92

According to Verizon's 2023 DBIR, 81% of data breaches involved compromised credentials, primarily weak or stolen passwords

Statistic 93

52% of users reuse the same password across multiple accounts, increasing breach propagation risk per LastPass 2022 report

Statistic 94

SplashData's 2023 worst passwords list shows "123456" used by 42% of analyzed leaked passwords

Statistic 95

NordPass 2023 study found 70% of passwords in breaches were under 12 characters, vulnerable to brute force

Statistic 96

Keeper Security 2023 report indicates 96% of users have weak passwords with common patterns like sequential characters

Statistic 97

Have I Been Pwned database contains over 12 billion pwned passwords as of 2024

Statistic 98

Google found 52% of users have used the same password for over a year without change in 2020 study

Statistic 99

1 in 5 users still use "password" or variations as their password per Specops 2023 analysis of 1B breached creds

Statistic 100

Microsoft's 2023 Digital Defense Report shows credential stuffing succeeds 1% of time but hits billions of attempts daily

Statistic 101

24% of breaches due to password spraying attacks per Microsoft, targeting weak enterprise passwords

Statistic 102

Bitwarden 2023 survey: 59% of people use passwords inspired by pets or family names, easily guessable

Statistic 103

Dashlane 2023 report: Average user has 100+ passwords but 68% admit reusing top 3 across sites

Statistic 104

1Password's 2022 study found 80% of cracked passwords in breaches contained dictionary words

Statistic 105

Okta's 2023 report: 40% of organizations experienced password-related breaches due to reuse

Statistic 106

Proofpoint 2023: 65% of users share passwords with colleagues, amplifying reuse risks

Statistic 107

CyberArk 2023: 47% of employees use same password for work and personal accounts

Statistic 108

TeamPassword 2023: Top 10 passwords account for 15% of all breached credentials analyzed

Statistic 109

Have I Been Pwned shows "qwerty" in position 8 of top 25 worst passwords across 10B+ entries

Statistic 110

Agari 2022: 30% of BEC attacks succeed via compromised weak passwords reused from prior breaches

Statistic 111

SpyCloud 2023: 70% of dark web accounts from breaches have passwords cracked within hours due to weakness

Statistic 112

JumpCloud 2023: 88% of IT admins report password reuse as top insider threat vector

Statistic 113

StrongDM 2023 analysis: Sequential passwords like "123456789" comprise 11% of enterprise breaches

Statistic 114

Aura 2023: 81% of hacking-related breaches linked to stolen or weak credentials per Verizon DBIR cite

Statistic 115

Password Manager 2023 survey: 42% of millennials reuse passwords across 5+ services

Trusted by 500+ publications
Harvard Business ReviewThe GuardianFortune+497
Imagine a world where billions of passwords—from yours to everyone you know—are scattered across the dark web, sold for pennies and used to unlock the digital doors of our lives; this is not a dystopian fiction but our stark reality, as evidenced by the relentless cascade of catastrophic data breaches plaguing companies like Yahoo, MySpace, and Facebook, where weak and reused credentials are the skeleton key for cybercriminals.

Key Takeaways

  • In the 2013 Yahoo data breach, approximately 3 billion user accounts were compromised, including names, email addresses, phone numbers, birthdates, encrypted passwords, and security questions, marking it as the largest known breach to date
  • The 2016 MySpace breach exposed 360 million accounts with usernames, email addresses, and salted MD5 password hashes, occurring due to a server misconfiguration
  • LinkedIn's 2012 breach affected 167 million accounts, leaking email addresses and unsalted SHA-1 password hashes, which were later cracked for over 90% of them
  • According to Verizon's 2023 DBIR, 81% of data breaches involved compromised credentials, primarily weak or stolen passwords
  • 52% of users reuse the same password across multiple accounts, increasing breach propagation risk per LastPass 2022 report
  • SplashData's 2023 worst passwords list shows "123456" used by 42% of analyzed leaked passwords
  • In healthcare, 25% of breaches in 2022 involved weak passwords per HHS OCR data
  • Financial services saw 18% of breaches due to credential compromise in Verizon 2023 DBIR, affecting banks heavily
  • Retail sector had 29% of breaches from stolen credentials in IBM 2023 Cost of Data Breach report
  • Average time to identify a breach is 204 days, with 28% involving credentials per IBM 2023 Cost of Data Breach
  • Mean time to contain a credential breach is 73 days per IBM 2023 report across industries
  • Verizon 2023 DBIR: 49% of breaches detected by third parties, often after password dumps surface
  • Cost of a data breach averaged $4.45 million in 2023, with credential compromise adding $1.2M extra per IBM
  • Weak credentials contribute to 20% higher breach costs, averaging $5.0M total per IBM 2023
  • Ponemon 2023 estimates password reset post-breach costs orgs $50 per user affected

Major data breaches compromise billions of passwords, causing immense financial and security damage.

Breach Incidents and Scale

  • In the 2013 Yahoo data breach, approximately 3 billion user accounts were compromised, including names, email addresses, phone numbers, birthdates, encrypted passwords, and security questions, marking it as the largest known breach to date
  • The 2016 MySpace breach exposed 360 million accounts with usernames, email addresses, and salted MD5 password hashes, occurring due to a server misconfiguration
  • LinkedIn's 2012 breach affected 167 million accounts, leaking email addresses and unsalted SHA-1 password hashes, which were later cracked for over 90% of them
  • Adobe's 2013 breach compromised 153 million customer records including usernames, encrypted passwords, and credit card details partially, via SQL injection
  • The 2014 eBay breach impacted 145 million users, exposing names, addresses, emails, and encrypted passwords from a compromised employee account
  • Dropbox's 2012 incident involved 68 million accounts with emails and hashed passwords dumped from a third-party breach
  • Tumblr's 2013 breach leaked 65 million usernames and SHA-1 hashed passwords due to an unsecured backup file
  • The RockYou 2009 breach revealed 32 million plaintext passwords from a gaming site, providing a massive dictionary for cracking
  • NetEase 2015 breach affected 235 million accounts with emails and MD5 hashed passwords from Chinese gaming firm
  • Canva's 2019 breach compromised 139 million accounts including emails, names, and salted bcrypt passwords
  • The 2021 Facebook breach exposed 533 million users' phone numbers, IDs, names, and emails from a 2019 scraping
  • Twitter's 2022 breach involved 200 million emails and phone numbers scraped via API vulnerability
  • Equifax 2017 breach affected 147 million with SSNs, DOBs, addresses, and some driver licenses via Apache Struts exploit
  • Marriott's Starwood 2018 breach impacted 500 million guests with passports, payment info, and contacts over 4 years
  • Capital One 2019 breach exposed 106 million application data including SSNs and bank details via AWS misconfig
  • First American Financial 2019 leak exposed 885 million file records with bank accounts and SSNs publicly accessible
  • Zynga 2019 breach hit 218 million with Facebook login credentials from Words with Friends
  • 000webhost 2015 breach leaked 15 million accounts with emails and plaintext passwords
  • AdultFriendFinder 2016 breach compromised 412 million accounts with emails, usernames, and MD5 passwords
  • Last.fm 2012 breach affected 43 million with usernames and MD5 passwords
  • Badoo 2013 breach exposed 109 million with names, emails, DOBs, and locations
  • Timehop 2018 breach impacted 21 million with names, emails, and phone numbers
  • MyFitnessPal 2018 breach hit 150 million users with emails and bcrypt passwords
  • Apollo.io 2021 breach leaked 250,000 records with company data and emails
  • Parler 2021 scrape exposed 70 million posts and user data post-Jan 6
  • VeriSign 2019 breach affected 235 million with domains and emails discovered in 2021
  • Snapchat 2014 breach leaked 4.6 million usernames and phone numbers
  • Ashley Madison 2015 breach exposed 37 million adulterers' details including emails and preferences
  • Sony Pictures 2014 breach leaked 47,000 SSNs, salaries, and emails via malware
  • Neopets 2016 breach compromised 69 million accounts with emails and passwords

Breach Incidents and Scale Interpretation

The historical ledger of digital crime reads like a tragic comedy of errors where billions of humans, in trusting a handful of passwords to a scattered few, were collectively handed a masterclass in the perpetual frailty of both code and human oversight.

Detection and Response Times

  • Average time to identify a breach is 204 days, with 28% involving credentials per IBM 2023 Cost of Data Breach
  • Mean time to contain a credential breach is 73 days per IBM 2023 report across industries
  • Verizon 2023 DBIR: 49% of breaches detected by third parties, often after password dumps surface
  • Mandiant M-Trends 2023: Median dwell time for credential abusers is 16 days, down from 24
  • Ponemon 2023: Organizations using MFA reduce detection time for password breaches by 50%
  • CrowdStrike 2023: 75% of breaches involved initial access via compromised passwords undetected for weeks
  • Microsoft 2023: Password spray attacks take average 2 weeks to detect in enterprises
  • Rapid7 2023: Credential stuffing incidents average 11 days from attack to alert
  • Splunk 2023: 60% of password breaches go undetected over 90 days without SIEM
  • Darktrace 2023: AI detects password anomalies in 1 hour vs 7 days manual
  • Palo Alto 2023: Ransomware post-password breach median 14 days to encryption
  • IBM X-Force 2023: Initial credential compromise to lateral movement averages 5 days
  • Accenture 2023: 37% of breaches notified after 6 months due to slow password monitoring
  • EY 2023: Financial firms average 277 days MTTD for credential breaches
  • KPMG 2023: Detection time for insider password misuse averages 100 days
  • Deloitte 2023: 55% of orgs take over month to respond to password stuffing alerts
  • McAfee 2023: Mobile password breaches detected in 3 days vs 21 for desktop
  • Sophos 2023: Ransomware dwell time post-password access 8 days average
  • Trend Micro 2023: APAC firms average 240 days to detect password breaches
  • FireEye (Mandiant) 2022: Nation-state password ops undetected for 21 days median

Detection and Response Times Interpretation

It seems we collectively take a casual two-hundred-day stroll to even notice the door's been kicked in, only to then spend months fumbling with the lock after the thieves have already redecorated the living room.

Economic Impact and Costs

  • Cost of a data breach averaged $4.45 million in 2023, with credential compromise adding $1.2M extra per IBM
  • Weak credentials contribute to 20% higher breach costs, averaging $5.0M total per IBM 2023
  • Ponemon 2023 estimates password reset post-breach costs orgs $50 per user affected
  • Verizon DBIR 2023: Breaches costing over $1M 60% involve stolen passwords
  • Average ransomware payout post-password breach $1.54M per Sophos 2023
  • Lost productivity from password breach remediation averages $1.5M per IBM X-Force
  • Notification costs post-breach average $0.25-$3 per record with passwords exposed, per BakerHostetler
  • Stock drops 7.5% average after major password breach announcements per Ponemon
  • Customer churn post-password breach 15-20% higher costing $2.5M avg per UpGuard
  • Legal fines for GDPR password breaches average €1.2M per case in 2023
  • Incident response retainers for password breaches cost $500-$1000/hour per firm
  • MFA implementation post-breach saves $1.3M avg per IBM 2023 lifecycle costs
  • Dark web sale of breached passwords fetches $10-100 per premium account per Flashpoint
  • Business interruption from password outage averages $8K/minute per Ponemon
  • Insurance premiums rise 25% post-password breach claims per CyberCube 2023
  • Reputation damage from breaches costs $1.4M additional per year per Ponemon
  • Free credit monitoring for 1 year post-breach costs $10/user avg
  • Global average breach cost $4.45M, US $9.44M with credentials highest at $5.13M per IBM
  • Small biz password breaches cost $25K avg but lead to 60% closure rate per SBA
  • Enterprise password manager savings $50/user/year vs breach costs per Gartner

Economic Impact and Costs Interpretation

While it's painfully clear that passwords are the digital equivalent of a screen door on a submarine, the truly shocking part is that we've collectively decided to pay millions for the privilege of cleaning up after every predictable break-in instead of just installing a better lock.

Industry and Sector Statistics

  • In healthcare, 25% of breaches in 2022 involved weak passwords per HHS OCR data
  • Financial services saw 18% of breaches due to credential compromise in Verizon 2023 DBIR, affecting banks heavily
  • Retail sector had 29% of breaches from stolen credentials in IBM 2023 Cost of Data Breach report
  • In education, 35% of incidents involved password breaches per Educause 2023 survey
  • Tech industry accounts for 22% of all major breaches tracked by HIBP with password dumps
  • Gaming sector breaches like Sony PSN 2011 affected 77 million with passwords and CC details
  • Government agencies reported 15% rise in password breaches in 2022 per GAO report
  • Energy/utilities had average breach cost $4.95M with 40% from credentials per IBM 2023
  • Hospitality like Marriott saw 500M guest records breached, 60% password related per analysis
  • Manufacturing sector 28% of breaches credential stuffing per Ponemon 2023
  • Pharma industry 32% breaches from weak passwords in 2022 HHS data
  • Transportation sector 20% increase in password incidents per Verizon 2023 DBIR
  • Media/entertainment like Sony Pictures 47K SSNs via password phishing precursor
  • Non-profits 25% breaches credential-based per IBM Cost report 2023
  • Telecom breaches like T-Mobile 2021 54M affected by API password flaws
  • E-commerce 40% of breaches involve reused passwords per RiskBased 2023
  • Legal services 22% password compromise rate in 2022 per ABA cybersecurity report
  • Construction industry 30% breaches from stolen creds per Verizon DBIR 2023
  • Insurance sector average 290 days to identify password breach per IBM 2023
  • Public admin 18% of state breaches password related per MS-ISAC 2023
  • Automotive like CDK Global 2024 ransomware hit passwords for 15K dealers

Industry and Sector Statistics Interpretation

Despite the endless variety of industries—from guarding lives in healthcare to guarding loot in gaming—they all share a common, glaring vulnerability: the tragically predictable human password.

Password Weakness and Reuse

  • According to Verizon's 2023 DBIR, 81% of data breaches involved compromised credentials, primarily weak or stolen passwords
  • 52% of users reuse the same password across multiple accounts, increasing breach propagation risk per LastPass 2022 report
  • SplashData's 2023 worst passwords list shows "123456" used by 42% of analyzed leaked passwords
  • NordPass 2023 study found 70% of passwords in breaches were under 12 characters, vulnerable to brute force
  • Keeper Security 2023 report indicates 96% of users have weak passwords with common patterns like sequential characters
  • Have I Been Pwned database contains over 12 billion pwned passwords as of 2024
  • Google found 52% of users have used the same password for over a year without change in 2020 study
  • 1 in 5 users still use "password" or variations as their password per Specops 2023 analysis of 1B breached creds
  • Microsoft's 2023 Digital Defense Report shows credential stuffing succeeds 1% of time but hits billions of attempts daily
  • 24% of breaches due to password spraying attacks per Microsoft, targeting weak enterprise passwords
  • Bitwarden 2023 survey: 59% of people use passwords inspired by pets or family names, easily guessable
  • Dashlane 2023 report: Average user has 100+ passwords but 68% admit reusing top 3 across sites
  • 1Password's 2022 study found 80% of cracked passwords in breaches contained dictionary words
  • Okta's 2023 report: 40% of organizations experienced password-related breaches due to reuse
  • Proofpoint 2023: 65% of users share passwords with colleagues, amplifying reuse risks
  • CyberArk 2023: 47% of employees use same password for work and personal accounts
  • TeamPassword 2023: Top 10 passwords account for 15% of all breached credentials analyzed
  • Have I Been Pwned shows "qwerty" in position 8 of top 25 worst passwords across 10B+ entries
  • Agari 2022: 30% of BEC attacks succeed via compromised weak passwords reused from prior breaches
  • SpyCloud 2023: 70% of dark web accounts from breaches have passwords cracked within hours due to weakness
  • JumpCloud 2023: 88% of IT admins report password reuse as top insider threat vector
  • StrongDM 2023 analysis: Sequential passwords like "123456789" comprise 11% of enterprise breaches
  • Aura 2023: 81% of hacking-related breaches linked to stolen or weak credentials per Verizon DBIR cite
  • Password Manager 2023 survey: 42% of millennials reuse passwords across 5+ services

Password Weakness and Reuse Interpretation

We are constantly building our own digital gallows out of lazy, reused passwords, with the statistics serving as a grim blueprint for how often the trapdoor gets used.

Sources & References