Key Takeaways
- In 2023, over 10 billion passwords were exposed in data breaches worldwide according to cybersecurity reports
- The 2023 Verizon Data Breach Investigations Report (DBIR) found that 81% of breaches involved weak, default, or stolen credentials
- RockYou2021 leak contained 8.4 billion unique passwords, the largest compilation ever
- "123456" was the most common password in the 2023 NordPass report, used by millions across leaks
- "123456789" ranked second in commonality, appearing in over 7.7 million leaked passwords per NordPass 2023
- "guest" is the 11th most common password, found in 1.2 million instances in breaches
- 59% of users reuse the exact same password across multiple accounts per 2023 Google survey
- Keeper Security 2023 report: 69% of people reuse passwords on work and personal accounts
- NordPass 2023: 82% of users have reused passwords, leading to credential stuffing attacks
- A 12-character password with uppercase, lowercase, numbers, symbols takes 34 years to crack with modern GPU
- 8-character lowercase-only password cracks in 2.5 hours on single GPU per Hive Systems 2023
- Passwords under 8 characters represent 20% of all leaked but crack 100% faster
- 2FA blocks 99.9% of automated attacks but only 30% adoption, Google 2023
- MFA reduces breach risk by 99% per Microsoft 2023 study on Azure AD
- 2023 Okta report: 37% of attacks bypassed legacy MFA like SMS
Weak and reused passwords are causing billions of accounts to be breached.
Common Weak Passwords
- "123456" was the most common password in the 2023 NordPass report, used by millions across leaks
- "123456789" ranked second in commonality, appearing in over 7.7 million leaked passwords per NordPass 2023
- "guest" is the 11th most common password, found in 1.2 million instances in breaches
- "qwerty" appears in 7.8 million leaked passwords according to Have I Been Pwned
- "password" is used by 3.8 million accounts in pwned databases
- "12345" ranks third, cracked in seconds and common in 95% of leaks
- "admin" is prevalent in IoT devices, found in 2.1 million breaches
- "letmein" appears 376,805 times in RockYou leak
- "welcome" is among top 25, used in 150,000+ instances
- "monkey" ranks high due to keyboard patterns, in 1 million leaks
- "dragon" is a popular fantasy-themed weak password in 500k+ cases
- "iloveyou" sentimental password in 300k breaches
- "baseball" sports-themed, top 20 in US leaks
- "football" another sports entry, 200k occurrences
- "sunshine" nature word, common in 180k passwords
- "trustno1" from X-Files, ironically weak in 150k cases
- "ninja" gaming term, top 50 globally
- "abc123" sequential, in 1.5 million leaks
- "princess" gender-themed, popular among females
- "flower" simple word, 120k instances
- "superman" superhero, top in US
- "batman" another hero, 90k uses
- "master" authority word, common admin pass
- "hello" basic greeting, in 80k breaches
- "freedom" patriotic, US top 100
- "shadow" dark theme, 70k occurrences
- "michael" common name, pet-like password
Common Weak Passwords Interpretation
Multi-Factor Authentication and Alternatives
- 2FA blocks 99.9% of automated attacks but only 30% adoption, Google 2023
- MFA reduces breach risk by 99% per Microsoft 2023 study on Azure AD
- 2023 Okta report: 37% of attacks bypassed legacy MFA like SMS
- Passkeys (FIDO2) prevent 100% phishing per Google 2023 trials with 1B+ accounts
- Only 11% of global consumers use MFA despite 70% availability, per Google 2023
- Enterprise MFA adoption: 52% in 2023, up from 40% in 2021, Yubico survey
- SMS MFA vulnerable to SIM swap, used in 15% of ATO fraud per FTC 2023
- Hardware keys stop 99.99% account takeovers, per Duo Security 2022
- Biometrics fail 1 in 50,000 but phishing resistant unlike passwords, NIST 2023
- Passwordless (Windows Hello) cuts helpdesk calls 90%, Microsoft 2023
- 76% of breaches exploitable without MFA, Verizon DBIR 2023
- TOTP apps phishable in 10% cases vs 0% for hardware, Google 2023
- Passkey adoption: 7% of Chrome users by mid-2024
- MFA fatigue attacks succeed in 50% of targeted execs, Proofpoint 2023
- FIDO2 websauthn supported by 90% browsers, reduces password use 40%
- Biometric + PIN hybrids secure 95% faster login, Apple 2023 stats
- 65% prefer passwordless after trial, per 1Password 2023 survey
- Zero-knowledge password managers encrypt 99.99% client-side, LastPass 2023
- SSH keys used in 80% secure dev environments vs passwords, GitHub 2023
- Certificate-based auth cuts credential theft 85%, Forrester 2023
- Risk-based MFA challenges only 2% logins, improves UX 70%, Okta 2023
- Hardware token reuse risk low, <0.01% compromise rate, Yubico 2024
- Password managers with MFA autofill prevent 95% stuffing, Bitwarden 2023
Multi-Factor Authentication and Alternatives Interpretation
Password Breaches and Leaks
- In 2023, over 10 billion passwords were exposed in data breaches worldwide according to cybersecurity reports
- The 2023 Verizon Data Breach Investigations Report (DBIR) found that 81% of breaches involved weak, default, or stolen credentials
- RockYou2021 leak contained 8.4 billion unique passwords, the largest compilation ever
- In 2022, 24 billion passwords were leaked across various breaches tracked by Cybernews
- Have I Been Pwned database now includes over 12 billion accounts from 861 breached sites as of 2024
- The 2013 Yahoo breach exposed 3 billion accounts, including hashed passwords
- LinkedIn 2021 scrape leak affected 700 million users' passwords and data
- MySpace 360 million password dump from 2008 breach surfaced in 2016
- Adobe 2013 breach leaked 153 million usernames and encrypted passwords
- Equifax 2017 breach impacted 147 million people, including some credential data
- 23andMe data breach in 2023 exposed 6.9 million users' ancestry and health data linked to credentials
- Twitter (X) 2022 breach leaked 200 million email-password pairs
- Dropbox 2012 breach affected 68 million accounts with passwords dumped in 2016
- Zynga 2019 breach exposed 173 million poker game users' credentials
- Under Armour MyFitnessPal 2018 breach impacted 150 million users' emails and hashed passwords
- Marriott 2018-2020 breaches exposed 500 million guest records including passport and payment data
- Capital One 2019 breach affected 106 million customers' data including login credentials
- eBay 2014 breach compromised 145 million user credentials
- Home Depot 2014 breach stole 56 million payment cards and 53 million emails
- Sony Pictures 2014 hack leaked employee credentials and executive data
- Target 2013 breach exposed 40 million cards and 70 million customer credentials
- Anthem 2015 breach hit 78.8 million records including health and login data
- AdultFriendFinder 2016 breach leaked 412 million accounts' details
- Ashley Madison 2015 hack exposed 37 million users' sensitive data
- Canva 2019 breach affected 139 million users with email-password combos
- Neopets 2020 breach dumped 69 million users' passwords from 2006
- Parler 2021 scrape leaked 70 million user posts and credentials
- Trello 2019 leak exposed 15 million workspace credentials via third-party
- NetEase 2015 breach leaked 235 million email-password pairs
Password Breaches and Leaks Interpretation
Password Reuse Statistics
- 59% of users reuse the exact same password across multiple accounts per 2023 Google survey
- Keeper Security 2023 report: 69% of people reuse passwords on work and personal accounts
- NordPass 2023: 82% of users have reused passwords, leading to credential stuffing attacks
- 2022 LastPass breach showed 30% of users reused passwords across services
- Specops 2023 study: 40% of enterprises have employees reusing passwords banned by policy
- Google 2020: 65% of users have reused passwords, 13% use same everywhere
- TeamPassword 2023: 91% of users acknowledge reusing passwords despite risks
- 52% of people use same password for email and banking per Dashlane 2022
- Cybersecurity Ventures: 81% credential breaches due to reuse in stuffing attacks
- 2023 Bitwarden survey: 70% of respondents reuse at least 2-3 passwords
- Proofpoint 2022: 66% reuse passwords across personal and work
- 1Password 2023: 60% admit to password reuse after breaches
- Harris Poll for Aura 2023: 47% use same password for multiple financial sites
- 73% of users reuse passwords on social media and email, per Kaspersky 2022
- Enterprise average: 50% password reuse rate in AD environments, Specops 2023
- 88% of breaches involve reused credentials per SpyCloud 2022
- 55% of millennials reuse passwords frequently, JumpCloud 2023
- 62% of Gen Z reuse due to convenience, per NordPass 2023 youth survey
- Corporate reuse: 45% use same password for VPN and email, Ponemon 2022
- 76% of hacked accounts had reused passwords from prior breaches, HIBP 2023
- Average user has 100+ passwords but reuses top 5 across sites, per Dashlane 2023
- 67% reuse after password manager recommendation ignored, LastPass 2023
- NIST estimates 80% of breaches from weak/reused passwords
- 71% of users share reused passwords with family, Aura 2023
Password Reuse Statistics Interpretation
Password Strength Metrics
- A 12-character password with uppercase, lowercase, numbers, symbols takes 34 years to crack with modern GPU
- 8-character lowercase-only password cracks in 2.5 hours on single GPU per Hive Systems 2023
- Passwords under 8 characters represent 20% of all leaked but crack 100% faster
- Average password length in breaches is 9.2 characters, per Specops 2023 analysis
- Only 15% of passwords use all character types (upper, lower, num, sym), NordPass 2023
- Dictionary words alone crack in under 1 second with 14 trillion wordlists like RockYou2021
- 95% of passwords crackable within 24 hours if under 10 chars without complexity
- Entropy of 12-char random password: 71 bits, resistant to brute force till 2030
- 43% of passwords contain only lowercase letters, crack time <1 minute
- Uppercase inclusion boosts strength by 37x, but only 58% use it
- Numbers in 72% but sequential like 123 in 40%, reducing strength 90%
- Symbols used in just 28% of passwords, increasing crack time 50x when included
- Keyboard patterns (qwerty, 123) in 13% of passwords, crack <10 seconds
- Personal info (names, DOB) in 22%, guessed easily via social engineering
- Passphrases of 4 random words (20 chars) have 40+ bits entropy, better than complex 8-char
- 67% of enterprise passwords fail NIST 800-63B strength checks
- GPU cluster cracks 100 billion hashes/sec for MD5, weak hashes on 80% old breaches
- Average crack time for top 1 million common passwords: instant
- Leet speak (p@ssw0rd) only delays crack by 2-5x, still weak
- 8-char complex password cracks in 7 hours on RTX 4090, per Hive 2024 update
- Passwords with repeats (aaa123) 50% weaker per entropy calc
- 25% of passwords are 6 chars or less, 100% crackable offline
- Diceware 6-word passphrase: 77 bits, secure for 100+ years
- Only 5% of users change passwords annually without breach force
Password Strength Metrics Interpretation
Sources & References
- Reference 1HAVEIBEENPWNEDhaveibeenpwned.comVisit source
- Reference 2VERIZONverizon.comVisit source
- Reference 3BLEEPINGCOMPUTERbleepingcomputer.comVisit source
- Reference 4CYBERNEWScybernews.comVisit source
- Reference 5BBCbbc.comVisit source
- Reference 6TROYHUNTtroyhunt.comVisit source
- Reference 7ZDNETzdnet.comVisit source
- Reference 8FTCftc.govVisit source
- Reference 9REUTERSreuters.comVisit source
- Reference 10NEWSnews.marriott.comVisit source
- Reference 11CAPITALONEcapitalone.comVisit source
- Reference 12CORPORATEcorporate.homedepot.comVisit source
- Reference 13SONYsony.comVisit source
- Reference 14CORPORATEcorporate.target.comVisit source
- Reference 15ANTHEManthem.comVisit source
- Reference 16CANVAcanva.comVisit source
- Reference 17BUSINESSINSIDERbusinessinsider.comVisit source
- Reference 18BLOGblog.trello.comVisit source
- Reference 19INFOSECURITY-MAGAZINEinfosecurity-magazine.comVisit source
- Reference 20NORDPASSnordpass.comVisit source
- Reference 21SPECTRUMspectrum.ieee.orgVisit source
- Reference 22KASPERSKYkaspersky.comVisit source
- Reference 23GITHUBgithub.comVisit source
- Reference 24KEEPERSECURITYkeepersecurity.comVisit source
- Reference 25SPICEWORKSspiceworks.comVisit source
- Reference 26BLOGblog.googleVisit source
- Reference 27BLOGblog.lastpass.comVisit source
- Reference 28SPECOPSSOFTspecopssoft.comVisit source
- Reference 29PASSWORDMANAGERpasswordmanager.comVisit source
- Reference 30TEAMPASSWORDteampassword.comVisit source
- Reference 31BLOGblog.dashlane.comVisit source
- Reference 32CYBERSECURITYVENTUREScybersecurityventures.comVisit source
- Reference 33BITWARDENbitwarden.comVisit source
- Reference 34PROOFPOINTproofpoint.comVisit source
- Reference 351PASSWORD1password.comVisit source
- Reference 36AURAaura.comVisit source
- Reference 37SPYCLOUDspycloud.comVisit source
- Reference 38JUMPCLOUDjumpcloud.comVisit source
- Reference 39PONEMONponemon.orgVisit source
- Reference 40LASTPASSlastpass.comVisit source
- Reference 41NVLPUBSnvlpubs.nist.govVisit source
- Reference 42HIVE-SYSTEMShive-systems.comVisit source
- Reference 43PAGESpages.nist.govVisit source
- Reference 44XKCDxkcd.comVisit source
- Reference 45HASHCAThashcat.netVisit source
- Reference 46ZXCVBNzxcvbn.pm.davidwong.frVisit source
- Reference 47WORLDworld.std.comVisit source
- Reference 48LANDINGlanding.google.comVisit source
- Reference 49MICROSOFTmicrosoft.comVisit source
- Reference 50OKTAokta.comVisit source
- Reference 51SECURITYsecurity.googleblog.comVisit source
- Reference 52YUBICOyubico.comVisit source
- Reference 53DUOduo.comVisit source
- Reference 54TECHCOMMUNITYtechcommunity.microsoft.comVisit source
- Reference 55CHROMESTATUSchromestatus.comVisit source
- Reference 56FIDOALLIANCEfidoalliance.orgVisit source
- Reference 57SECURITYsecurity.apple.comVisit source
- Reference 58GITHUBgithub.blogVisit source
- Reference 59FORRESTERforrester.comVisit source






