Key Takeaways
- 81% of hacking-related breaches leveraged weak, default, or stolen passwords in 2023
- In 2022, credential stuffing attacks accounted for 30% of all breaches
- 74% of breaches in 2021 involved compromised credentials
- Average password cracked in 7 seconds with modern hardware
- 83% of passwords can be cracked in under a day
- Top 10,000 passwords crack 98% of attempts offline
- 3.2 billion credentials from 100+ breaches in 2022
- LinkedIn breach exposed 700 million passwords in 2021
- Yahoo's 2013 breach leaked 3 billion accounts
- 68% of people reuse passwords across accounts
- 59% of users share passwords with others
- Only 24% use password managers regularly
- MFA reduces unauthorized access by 99.9%
- Passwordless logins block 99% of automated attacks
- Password managers prevent 80% of reuse issues
Weak passwords cause most data breaches, posing a constant and major security risk.
Data Breaches Involving Passwords
- 3.2 billion credentials from 100+ breaches in 2022
- LinkedIn breach exposed 700 million passwords in 2021
- Yahoo's 2013 breach leaked 3 billion accounts
- RockYou 2009 dump: 32 million plaintext passwords
- Marriott breach 2018: 500 million guest passwords
- Adobe 2013: 153 million encrypted passwords cracked
- Equifax 2017: 147 million credentials exposed
- MySpace 2016: 360 million passwords leaked
- Dropbox 2012: 68 million passwords in 2016 leak
- Twitter 2009: 33 million passwords from 2022 leak
- Sony 2011: 77 million PlayStation passwords
- eBay 2014: 145 million user credentials
- Capital One 2019: 100 million customer passwords
- Zynga 2019: 218 million passwords from Words with Friends
- Neopets 2020: 69 million passwords exposed
- Canva 2022: 4 million passwords stolen
- Twitter 2022: 5.4 million API keys and passwords
- LastPass 2022: Encrypted password vaults stolen
- MOVEit 2023: 60 million passwords from supply chain
- MGM Resorts 2023: 10.6 billion passwords in infostealer dump
- 23andMe 2023: 6.9 million passwords via credential stuffing
- Optus 2022: 10 million Australian passwords
- T-Mobile 2021: 54 million passwords leaked
- Facebook 2019: 533 million passwords in plain text
- Under Armour 2020: 150 million MyFitnessPal passwords
- Ticketmaster 2023: 560 million passwords rumored
Data Breaches Involving Passwords Interpretation
Incidence Rates
- 81% of hacking-related breaches leveraged weak, default, or stolen passwords in 2023
- In 2022, credential stuffing attacks accounted for 30% of all breaches
- 74% of breaches in 2021 involved compromised credentials
- Password attacks rose by 25% year-over-year in 2023 per Akamai
- 1 in 3 data breaches start with a phishing attack targeting passwords in 2023
- Brute force attacks increased 300% during COVID-19 lockdowns
- 23 billion passwords exposed in breaches as of 2023
- Over 500 million accounts hit by credential stuffing in 2022
- Password spraying attacks up 550% in 2023
- 40% of organizations faced password breach attempts daily in 2023
- 68% of enterprises experienced at least one password-related breach in 2022
- Global password attacks hit 15 billion per month in 2023
- 29% of all breaches in 2023 were due to stolen credentials
- Credential abuse was factor in 50% of initial access vectors
- 3.9 billion login attempts blocked as malicious in Q1 2023
- Password guessing accounts for 17% of web app attacks
- 80 million unique passwords cracked in RockYou2021 dump
- Daily average of 2,000 password attacks per organization
- 61% rise in automated password attacks in 2023
- 123456 remains top targeted password in 85% of attacks
- Hybrid brute-force attacks surged 71% in 2022
- 45% of RDP attacks target weak passwords
- Over 100 billion passwords leaked historically
- 25% of breaches exploit default credentials
- Phishing for passwords succeeds in 1 out of 10 attempts
- 193 million API keys and passwords exposed on GitHub in 2023
- Password reuse leads to 52% of breaches
- 70% of hacked accounts use duplicate passwords
- 1.4 billion credentials circulating on dark web in 2023
Incidence Rates Interpretation
Mitigation Strategies
- MFA reduces unauthorized access by 99.9%
- Passwordless logins block 99% of automated attacks
- Password managers prevent 80% of reuse issues
- 2FA stops 96% of account takeover attempts
- Hardware keys reduce phishing success by 100%
- Rate limiting cuts brute force by 99%
- Passkeys block credential stuffing entirely
- Biometrics reduce password attacks by 90%
- Zero-knowledge encryption in managers unbreakable
- Password auditing tools find 85% weak passwords
- CAPTCHA blocks 95% bot logins
- Account lockout after 5 fails stops 98% attacks
- Argon2 hashing increases crack time 1000x
- Monitoring dark web leaks prevents 70% breaches
- SSO reduces password surface by 50%
- Behavioral biometrics detects 99% anomalies
- PKI certs eliminate password needs
- Passwordless adoption grew 300% in 2023
- Training reduces phishing clicks by 40%
- WebAuthn standard resists phishing 100%
- Entropy checks block 75% weak entries
- Breach alerts change 60% of passwords proactively
- YubiKey reduces breaches by 99.9% in tests
- Adaptive auth blocks 92% risky logins
- No plain-text storage cuts leak impact 100%
- Peppering salts boosts security 50x
- Automated rotation cuts exposure 80%
- FIDO2 adoption halves support tickets
- Honeypot accounts trap 85% attackers
- Quantum-resistant hashing in dev 10x slower
Mitigation Strategies Interpretation
Password Vulnerabilities
- Average password cracked in 7 seconds with modern hardware
- 83% of passwords can be cracked in under a day
- Top 10,000 passwords crack 98% of attempts offline
- 51% of passwords contain personal info like names
- Only 8 characters long passwords crack in minutes
- Dictionary attacks succeed on 30% of hashed passwords
- 91% of passwords fail basic NIST standards
- Rainbow tables crack NTLM hashes in seconds
- 76% of users have passwords under 12 characters
- GPU cracking speed hits 100 billion hashes/sec for MD5
- 24% of passwords use sequential keys like qwerty
- SHA-1 hashes crackable for 40% of passwords under 8 chars
- 65% of passwords vulnerable to hybrid attacks
- Common passwords like 'password123' crack instantly
- 42% of breached passwords were less than 8 characters
- bcrypt with low rounds cracks 20% faster on ASICs
- 88% of passwords reuse top 1000 common ones
- Password entropy below 40 bits for 70% of users
- LLM-generated passwords crack 15% easier due to patterns
- 55% of passwords include dates like birthdays
- Argon2 recommended as 50% slower to crack than scrypt
- 96% of 4-digit PINs crackable in under 20 hours
- Keyboard patterns cover 10% of all passwords
- Weak salts allow 90% mass cracking
- 67% of corporate passwords crackable offline
- Passphrases with 4 words average 44 bits entropy
- 73% vulnerable to rule-based mutations
- MD5 collision attacks bypass 25% of hashes
- 12-character passwords take 34 years to crack online
- 82% of passwords fail zxcvbn strength test
- GPU farms crack 10^12 hashes/sec for SHA256
Password Vulnerabilities Interpretation
User Habits
- 68% of people reuse passwords across accounts
- 59% of users share passwords with others
- Only 24% use password managers regularly
- 52% of users write down passwords insecurely
- Average user has 100+ passwords to manage
- 91% of users know password hygiene but ignore it
- 73% reuse passwords from work to personal
- 44% use pet names in passwords
- 69% of millennials use social media info in passwords
- Only 35% change passwords after breach notification
- 81% of consumers use same password everywhere
- 57% admit to using 'password' or variations
- Average password age is 146 days before change
- 62% of users pick passwords based on ease, not security
- 48% share passwords with family members
- Only 12% enable 2FA everywhere possible
- 77% of users have 5 or fewer unique passwords
- 65% use birthdays in passwords
- 39% never change default router passwords
- 84% of remote workers reuse passwords insecurely
- 70% of Gen Z use same password for streaming/social
- 55% store passwords in browsers unencrypted
- 67% ignore password expiration policies
- Average person forgets 3 passwords per month
- 76% use names of loved ones in passphrases
- Only 28% test password strength before using
- 61% of users pick sports teams for passwords
- 49% use phone numbers in passwords
- 82% don't use unique passwords for banking
- 71% of parents share passwords with kids
User Habits Interpretation
Sources & References
- Reference 1VERIZONverizon.comVisit source
- Reference 2AKAMAIakamai.comVisit source
- Reference 3IBMibm.comVisit source
- Reference 4IMPERVAimperva.comVisit source
- Reference 5HAVEIBEENPWNEDhaveibeenpwned.comVisit source
- Reference 6PROOFPOINTproofpoint.comVisit source
- Reference 7PINGIDENTITYpingidentity.comVisit source
- Reference 8OKTAokta.comVisit source
- Reference 9BLOGblog.cloudflare.comVisit source
- Reference 10ATTACKattack.mitre.orgVisit source
- Reference 11OWASPowasp.orgVisit source
- Reference 12BLEEPINGCOMPUTERbleepingcomputer.comVisit source
- Reference 13SENTINELONEsentinelone.comVisit source
- Reference 14HELPNETSECURITYhelpnetsecurity.comVisit source
- Reference 15SPLASHDATAsplashdata.comVisit source
- Reference 16DARKTRACEdarktrace.comVisit source
- Reference 17MICROSOFTmicrosoft.comVisit source
- Reference 18GUARDIANguardian.digitalVisit source
- Reference 19LASTPASSlastpass.comVisit source
- Reference 20HIBPhibp.comVisit source
- Reference 21DIGITALSHADOWSdigitalshadows.comVisit source
- Reference 22HIVEhive.systemsVisit source
- Reference 23SPECOPSSOFTspecopssoft.comVisit source
- Reference 24RESEARCHresearch.checkpoint.comVisit source
- Reference 25NORDPASSnordpass.comVisit source
- Reference 26KASPERSKYkaspersky.comVisit source
- Reference 27USENIXusenix.orgVisit source
- Reference 28PAGESpages.nist.govVisit source
- Reference 29SCHNEIERschneier.comVisit source
- Reference 30KEEPERSECURITYkeepersecurity.comVisit source
- Reference 31OPENWALLopenwall.comVisit source
- Reference 32ARSTECHNICAarstechnica.comVisit source
- Reference 33RAPID7rapid7.comVisit source
- Reference 34SPICEWORKSspiceworks.comVisit source
- Reference 35TARSNAPtarsnap.comVisit source
- Reference 36DROPBOXdropbox.comVisit source
- Reference 37CORRECTHORSEBATTERYSTAPLEcorrecthorsebatterystaple.netVisit source
- Reference 38ARXIVarxiv.orgVisit source
- Reference 39PASSWORDWARDENSpasswordwardens.comVisit source
- Reference 40BIOMETRICSbiometrics.comVisit source
- Reference 41BLACKHATblackhat.comVisit source
- Reference 42XKCDxkcd.comVisit source
- Reference 43TOOLStools.kali.orgVisit source
- Reference 44CRYPTOLOGYcryptology.eecs.umich.eduVisit source
- Reference 45HOWSECUREISMYPASSWORDhowsecureismypassword.netVisit source
- Reference 46GITHUBgithub.comVisit source
- Reference 47HASHCAThashcat.netVisit source
- Reference 48EXPLOIT-DBexploit-db.comVisit source
- Reference 49NEWSnews.marriott.comVisit source
- Reference 50ZDNETzdnet.comVisit source
- Reference 51EQUIFAXSECURITY2017equifaxsecurity2017.comVisit source
- Reference 52TROYHUNTtroyhunt.comVisit source
- Reference 53WIREDwired.comVisit source
- Reference 54BBCbbc.comVisit source
- Reference 55EBAYINCebayinc.comVisit source
- Reference 56CAPITALONEcapitalone.comVisit source
- Reference 57CANVAcanva.comVisit source
- Reference 58BLOGblog.lastpass.comVisit source
- Reference 59PROGRESSprogress.comVisit source
- Reference 60BLOGblog.23andme.comVisit source
- Reference 61OPTUSoptus.com.auVisit source
- Reference 62T-MOBILEt-mobile.comVisit source
- Reference 63BUSINESSINSIDERbusinessinsider.comVisit source
- Reference 64ABOUTabout.underarmour.comVisit source
- Reference 65CYBERNEWScybernews.comVisit source
- Reference 66PONEMONponemon.orgVisit source
- Reference 67NORTONnorton.comVisit source
- Reference 68DASHLANEdashlane.comVisit source
- Reference 69JSCRAMBLERjscrambler.comVisit source
- Reference 70TEAMBLINDteamblind.comVisit source
- Reference 71GOOGLEgoogle.comVisit source
- Reference 72UPGUARDupguard.comVisit source
- Reference 73THINKWITHGOOGLEthinkwithgoogle.comVisit source
- Reference 74PASSWORDMANAGERpasswordmanager.comVisit source
- Reference 75BEYONDTRUSTbeyondtrust.comVisit source
- Reference 76PSYCHOLOGYTODAYpsychologytoday.comVisit source
- Reference 77HABITSLABShabitslabs.comVisit source
- Reference 78BITWARDENbitwarden.comVisit source
- Reference 79CONSUMERREPORTSconsumerreports.orgVisit source
- Reference 80FAMILYSAFETYINSTITUTEfamilysafetyinstitute.orgVisit source
- Reference 81FIDOALLIANCEfidoalliance.orgVisit source
- Reference 82THALESGROUPthalesgroup.comVisit source
- Reference 831PASSWORD1password.comVisit source
- Reference 84CLOUDcloud.google.comVisit source
- Reference 85CHEATSHEETSERIEScheatsheetseries.owasp.orgVisit source
- Reference 86ARGON2argon2.comVisit source
- Reference 87BEHAVIORALBIOMETRICSbehavioralbiometrics.comVisit source
- Reference 88CSRCcsrc.nist.govVisit source
- Reference 89HIDGLOBALhidglobal.comVisit source
- Reference 90WEBAUTHNwebauthn.guideVisit source
- Reference 91YUBICOyubico.comVisit source
- Reference 92RISKBASEDSECURITYriskbasedsecurity.comVisit source
- Reference 93HASHICORPhashicorp.comVisit source
- Reference 94THREATPOSTthreatpost.comVisit source






