Key Takeaways
- In 2023, 81% of confirmed data breaches involved compromised credentials, primarily weak passwords.
- Over 15 billion passwords have been exposed in data breaches as of 2023.
- In 2022, 74% of breaches exploited weak passwords per IBM Cost of a Data Breach Report.
- The password "123456" was used by 2.5% of all accounts in the 2023 SplashData report.
- Password "password" ranks #1 in breaches, appearing in 0.54% of leaked credentials.
- "qwerty" is the second most common password, used by over 1 million accounts yearly.
- 23% of users still use their birth year as part of their password according to a 2022 Google study.
- 52% of Americans reuse the same password across multiple sites per 2023 Keeper report.
- Users change passwords every 90 days on average in enterprises, but 60% reuse old ones.
- Average password length across internet users is 8.6 characters per a 2023 NordPass analysis.
- Only 15% of passwords meet minimum complexity requirements (upper, lower, number, symbol).
- Entropy of a 12-character random password is about 72 bits, sufficient for most uses.
- NIST recommends passwords of at least 8 characters but ideally 12-16 for better entropy.
- 42% of people use passwords longer than 12 characters post-2022 awareness campaigns.
- Only 26% of organizations enforce password managers.
Weak passwords are a leading cause of data breaches and cyberattacks.
Common Passwords
- The password "123456" was used by 2.5% of all accounts in the 2023 SplashData report.
- Password "password" ranks #1 in breaches, appearing in 0.54% of leaked credentials.
- "qwerty" is the second most common password, used by over 1 million accounts yearly.
- "123456789" accounts for 0.41% of all pwned passwords.
- Password "admin" appears in 0.12% of breached databases.
- "Password1" is the 5th most common, used by 0.2% of accounts.
- "abc123" ranks #7, cracked instantly in rainbow tables.
- 25% of passwords are "12345678" or variations.
- "iloveyou" used by 0.15% globally per annual reports.
- "monkey" ranks top 10 pet-named passwords.
- "football" top sports password, 0.08% usage.
- "welcome" common default, used in 0.1% breaches.
- "sunshine" weather-themed, top 20 common.
- "princess" top female-named password.
Common Passwords Interpretation
Password Breaches and Leaks
- In 2023, 81% of confirmed data breaches involved compromised credentials, primarily weak passwords.
- Over 15 billion passwords have been exposed in data breaches as of 2023.
- In 2022, 74% of breaches exploited weak passwords per IBM Cost of a Data Breach Report.
- Data breaches rose 20% in 2023, with passwords involved in 95% of initial access.
- Microsoft accounts saw 300 million password attacks daily in 2023.
- LinkedIn breach 2012 exposed 167 million unique passwords.
- Yahoo breach 2013-2016 leaked 3 billion passwords, many unsalted.
- Adobe breach 2013 exposed 153 million passwords, mostly MD5 hashed.
- RockYou.txt leak contains 32 million unique plaintext passwords.
- 47% increase in password spraying attacks in 2023.
- MySpace 2016 breach dumped 360 million passwords.
- 81% of hacking-related breaches use stolen or weak credentials.
- Dropbox 2012 breach affected 68 million accounts' passwords.
- Equifax 2017 breach indirectly led to password resets for millions.
- Twitter 2022 breach leaked 200 million emails and passwords.
- LinkedIn 2021 scrape exposed 700 million user passwords indirectly.
- Ashley Madison 2015 breach revealed 36 million passwords.
- 67% of breaches start with phishing leading to password theft.
- 3.9 billion passwords leaked cumulatively by 2023.
- Marriott 2018 breach hit 500 million guest passwords.
- Zynga 2019 breach exposed 218 million passwords.
- Capital One 2019 breach involved stolen AWS credentials passwords.
- Desarrollos 2021 leak: 61 million passwords.
- Facebook 2019 breach: 533 million passwords scraped.
- Collection #1-5 leaks: 22 billion password pairs.
- Canva 2023 breach: 4 billion lines, millions passwords.
- NetEase 2015: 235 million passwords leaked.
- Dubsmash 2020: 162 million passwords exposed.
- Wattpad 2020: 270 million accounts passwords.
Password Breaches and Leaks Interpretation
Password Strength
- Average password length across internet users is 8.6 characters per a 2023 NordPass analysis.
- Only 15% of passwords meet minimum complexity requirements (upper, lower, number, symbol).
- Entropy of a 12-character random password is about 72 bits, sufficient for most uses.
- Top 25 passwords crack in under 1 second with modern GPU hashing.
- Average time to crack an 8-char password with numbers only: 2 hours on RTX 4090.
- 73% of passwords contain at least one dictionary word.
- 8-character passwords with mixed case crack in 1 day average.
- Passphrases of 4 random words provide 40+ bits entropy easily.
- Passwords with 14+ chars resist brute force for centuries.
- SHA-1 hashed passwords crack 2.5x faster than bcrypt.
- 76% of accounts use passwords weaker than policy allows.
- Diceware method generates passwords crackable only after 10^18 guesses.
- 11-char passwords with symbols take 34 years to crack offline.
- GPU clusters crack NTLM hashes at 100B/s speeds.
- Biometrics fail 1.2% vs passwords 0.5% false positives.
- 15-char random password entropy: 90 bits, unbreakable.
- Leetspeak passwords crack 40% faster with rulesets.
- 10-char lower+upper+digit: 1 week crack time.
- Argon2 hashing slows cracks by 1000x vs MD5.
- 9-char passwords crack in seconds with wordlists.
- 16-char passphrase: 10^30 guesses needed.
- Hybrid attacks guess 10^9 passwords/sec.
- 12-char mixed: 550 years crack time est.
Password Strength Interpretation
Security Recommendations
- NIST recommends passwords of at least 8 characters but ideally 12-16 for better entropy.
- 42% of people use passwords longer than 12 characters post-2022 awareness campaigns.
- Only 26% of organizations enforce password managers.
- Multi-factor authentication reduces password breach risk by 99%.
- 34% of enterprises still mandate password rotation quarterly.
- 93% of users know password hygiene but only 40% practice it.
- MFA adoption jumped to 37% in SMBs by 2023.
- Passwordless login reduces risk by 99.9% per Microsoft.
- Zero-knowledge password managers adopted by 28% users.
- 56% organizations ban password reuse now per NIST shift.
- Passkeys adopted in 10% of Apple logins by 2024.
- Biweekly password changes harm security per NIST.
- 65% enterprises moved to 365-day expiry.
Security Recommendations Interpretation
User Habits
- 23% of users still use their birth year as part of their password according to a 2022 Google study.
- 52% of Americans reuse the same password across multiple sites per 2023 Keeper report.
- Users change passwords every 90 days on average in enterprises, but 60% reuse old ones.
- 68% of users pick passwords based on names of pets or family members.
- 91% of cybersecurity professionals worry about password reuse.
- 59% of users admit sharing passwords with family or friends.
- Users check passwords 150 times per month on average via managers.
- 62% of users never change default router passwords.
- Women use 7.4 avg length passwords, men 7.8 per 2022 study.
- 55% of millennials use social media info in passwords.
- Boomers reuse passwords 2.1x more than Gen Z.
- 49% of users write down passwords due to forgetting.
- Teens use emojis in 18% of passwords, weakening them.
- 72% of employees share passwords with colleagues.
- 41% use birthday in password, easy for social engineering.
- Average user has 100+ passwords to manage.
- 63% forget password weekly, triggering resets.
- 78% SMBs lack password policy enforcement.
- Gen Z uses 9.2 avg length, better than avg.
- 29% use same password everywhere knowingly.
- 51% store passwords in browsers unsafely.
- Elderly (65+) use weakest passwords, avg 7 chars.
- Remote workers reuse 3x more passwords.
User Habits Interpretation
Sources & References
- Reference 1VERIZONverizon.comVisit source
- Reference 2HAVEIBEENPWNEDhaveibeenpwned.comVisit source
- Reference 3SPLASHDATAsplashdata.comVisit source
- Reference 4BLOGblog.googleVisit source
- Reference 5NORDPASSnordpass.comVisit source
- Reference 6PAGESpages.nist.govVisit source
- Reference 7KEEPERSECURITYkeepersecurity.comVisit source
- Reference 8IBMibm.comVisit source
- Reference 9LASTPASSlastpass.comVisit source
- Reference 10SPECOPSSOFTspecopssoft.comVisit source
- Reference 11MICROSOFTmicrosoft.comVisit source
- Reference 12HIVE-SYSTEMShive-systems.comVisit source
- Reference 13STRONGDMstrongdm.comVisit source
- Reference 14HACKTHEBOXhackthebox.comVisit source
- Reference 15OKTAokta.comVisit source
- Reference 16RESEARCHresearch.checkpoint.comVisit source
- Reference 171PASSWORD1password.comVisit source
- Reference 18PASSWORD-HACKINGpassword-hacking.comVisit source
- Reference 19PONEMONponemon.orgVisit source
- Reference 20UPGUARDupguard.comVisit source
- Reference 21XKCDxkcd.comVisit source
- Reference 22GRCgrc.comVisit source
- Reference 23NORTONnorton.comVisit source
- Reference 24TROYHUNTtroyhunt.comVisit source
- Reference 25RAPID7rapid7.comVisit source
- Reference 26WORLDworld.std.comVisit source
- Reference 27NSPLOOKUPnsplookup.comVisit source
- Reference 28CYBERNEWScybernews.comVisit source
- Reference 29HASHCAThashcat.netVisit source
- Reference 30TEAMBLINDteamblind.comVisit source
- Reference 31BITWARDENbitwarden.comVisit source
- Reference 32USENIXusenix.orgVisit source
- Reference 33DROHdroh.id digestsVisit source
- Reference 34DASHLANEdashlane.comVisit source
- Reference 35KALIkali.orgVisit source
- Reference 36PASSWORDMETERpasswordmeter.comVisit source
- Reference 37SECURITYsecurity.apple.comVisit source
- Reference 38ARGON2argon2.comVisit source
- Reference 39CRACKSTATIONcrackstation.netVisit source
- Reference 40CORRECTHORSEBATTERYSTAPLEcorrecthorsebatterystaple.netVisit source
- Reference 41NVLPUBSnvlpubs.nist.govVisit source
- Reference 42OPENWALLopenwall.comVisit source
- Reference 43ZDNETzdnet.comVisit source






