Key Takeaways
- 81% of hacking-related breaches leveraged weak, default, or stolen passwords in 2023
- In 2022, credential stuffing attacks accounted for 30% of all breaches
- 74% of breaches in 2021 involved compromised credentials
- Average password cracked in 7 seconds with modern hardware
- 83% of passwords can be cracked in under a day
- Top 10,000 passwords crack 98% of attempts offline
- 3.2 billion credentials from 100+ breaches in 2022
- LinkedIn breach exposed 700 million passwords in 2021
- Yahoo's 2013 breach leaked 3 billion accounts
- 68% of people reuse passwords across accounts
- 59% of users share passwords with others
- Only 24% use password managers regularly
- MFA reduces unauthorized access by 99.9%
- Passwordless logins block 99% of automated attacks
- Password managers prevent 80% of reuse issues
Weak passwords cause most data breaches, posing a constant and major security risk.
Data Breaches Involving Passwords
Data Breaches Involving Passwords Interpretation
Incidence Rates
Incidence Rates Interpretation
Mitigation Strategies
Mitigation Strategies Interpretation
Password Vulnerabilities
Password Vulnerabilities Interpretation
User Habits
User Habits Interpretation
Sources & References
- Reference 1VERIZONverizon.comVisit source
- Reference 2AKAMAIakamai.comVisit source
- Reference 3IBMibm.comVisit source
- Reference 4IMPERVAimperva.comVisit source
- Reference 5HAVEIBEENPWNEDhaveibeenpwned.comVisit source
- Reference 6PROOFPOINTproofpoint.comVisit source
- Reference 7PINGIDENTITYpingidentity.comVisit source
- Reference 8OKTAokta.comVisit source
- Reference 9BLOGblog.cloudflare.comVisit source
- Reference 10ATTACKattack.mitre.orgVisit source
- Reference 11OWASPowasp.orgVisit source
- Reference 12BLEEPINGCOMPUTERbleepingcomputer.comVisit source
- Reference 13SENTINELONEsentinelone.comVisit source
- Reference 14HELPNETSECURITYhelpnetsecurity.comVisit source
- Reference 15SPLASHDATAsplashdata.comVisit source
- Reference 16DARKTRACEdarktrace.comVisit source
- Reference 17MICROSOFTmicrosoft.comVisit source
- Reference 18GUARDIANguardian.digitalVisit source
- Reference 19LASTPASSlastpass.comVisit source
- Reference 20HIBPhibp.comVisit source
- Reference 21DIGITALSHADOWSdigitalshadows.comVisit source
- Reference 22HIVEhive.systemsVisit source
- Reference 23SPECOPSSOFTspecopssoft.comVisit source
- Reference 24RESEARCHresearch.checkpoint.comVisit source
- Reference 25NORDPASSnordpass.comVisit source
- Reference 26KASPERSKYkaspersky.comVisit source
- Reference 27USENIXusenix.orgVisit source
- Reference 28PAGESpages.nist.govVisit source
- Reference 29SCHNEIERschneier.comVisit source
- Reference 30KEEPERSECURITYkeepersecurity.comVisit source
- Reference 31OPENWALLopenwall.comVisit source
- Reference 32ARSTECHNICAarstechnica.comVisit source
- Reference 33RAPID7rapid7.comVisit source
- Reference 34SPICEWORKSspiceworks.comVisit source
- Reference 35TARSNAPtarsnap.comVisit source
- Reference 36DROPBOXdropbox.comVisit source
- Reference 37CORRECTHORSEBATTERYSTAPLEcorrecthorsebatterystaple.netVisit source
- Reference 38ARXIVarxiv.orgVisit source
- Reference 39PASSWORDWARDENSpasswordwardens.comVisit source
- Reference 40BIOMETRICSbiometrics.comVisit source
- Reference 41BLACKHATblackhat.comVisit source
- Reference 42XKCDxkcd.comVisit source
- Reference 43TOOLStools.kali.orgVisit source
- Reference 44CRYPTOLOGYcryptology.eecs.umich.eduVisit source
- Reference 45HOWSECUREISMYPASSWORDhowsecureismypassword.netVisit source
- Reference 46GITHUBgithub.comVisit source
- Reference 47HASHCAThashcat.netVisit source
- Reference 48EXPLOIT-DBexploit-db.comVisit source
- Reference 49NEWSnews.marriott.comVisit source
- Reference 50ZDNETzdnet.comVisit source
- Reference 51EQUIFAXSECURITY2017equifaxsecurity2017.comVisit source
- Reference 52TROYHUNTtroyhunt.comVisit source
- Reference 53WIREDwired.comVisit source
- Reference 54BBCbbc.comVisit source
- Reference 55EBAYINCebayinc.comVisit source
- Reference 56CAPITALONEcapitalone.comVisit source
- Reference 57CANVAcanva.comVisit source
- Reference 58BLOGblog.lastpass.comVisit source
- Reference 59PROGRESSprogress.comVisit source
- Reference 60BLOGblog.23andme.comVisit source
- Reference 61OPTUSoptus.com.auVisit source
- Reference 62T-MOBILEt-mobile.comVisit source
- Reference 63BUSINESSINSIDERbusinessinsider.comVisit source
- Reference 64ABOUTabout.underarmour.comVisit source
- Reference 65CYBERNEWScybernews.comVisit source
- Reference 66PONEMONponemon.orgVisit source
- Reference 67NORTONnorton.comVisit source
- Reference 68DASHLANEdashlane.comVisit source
- Reference 69JSCRAMBLERjscrambler.comVisit source
- Reference 70TEAMBLINDteamblind.comVisit source
- Reference 71GOOGLEgoogle.comVisit source
- Reference 72UPGUARDupguard.comVisit source
- Reference 73THINKWITHGOOGLEthinkwithgoogle.comVisit source
- Reference 74PASSWORDMANAGERpasswordmanager.comVisit source
- Reference 75BEYONDTRUSTbeyondtrust.comVisit source
- Reference 76PSYCHOLOGYTODAYpsychologytoday.comVisit source
- Reference 77HABITSLABShabitslabs.comVisit source
- Reference 78BITWARDENbitwarden.comVisit source
- Reference 79CONSUMERREPORTSconsumerreports.orgVisit source
- Reference 80FAMILYSAFETYINSTITUTEfamilysafetyinstitute.orgVisit source
- Reference 81FIDOALLIANCEfidoalliance.orgVisit source
- Reference 82THALESGROUPthalesgroup.comVisit source
- Reference 831PASSWORD1password.comVisit source
- Reference 84CLOUDcloud.google.comVisit source
- Reference 85CHEATSHEETSERIEScheatsheetseries.owasp.orgVisit source
- Reference 86ARGON2argon2.comVisit source
- Reference 87BEHAVIORALBIOMETRICSbehavioralbiometrics.comVisit source
- Reference 88CSRCcsrc.nist.govVisit source
- Reference 89HIDGLOBALhidglobal.comVisit source
- Reference 90WEBAUTHNwebauthn.guideVisit source
- Reference 91YUBICOyubico.comVisit source
- Reference 92RISKBASEDSECURITYriskbasedsecurity.comVisit source
- Reference 93HASHICORPhashicorp.comVisit source
- Reference 94THREATPOSTthreatpost.comVisit source






