Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Eero Signal Ensures Continuous Business Connectivity Even During Internet Outages

    Mayıs 1, 2026

    7 Simple but Surprising Ways to Boost Your TV’s Sound Quality at Home

    Mayıs 1, 2026

    From AI Pilots to Enterprise Value: Building the Superhighway

    Mayıs 1, 2026
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      7 Simple but Surprising Ways to Boost Your TV’s Sound Quality at Home

      Mayıs 1, 2026

      From AI Pilots to Enterprise Value: Building the Superhighway

      Mayıs 1, 2026

      How I Fixed My Home Wi-Fi Dead Zones: 6 Practical Solutions That Made a Real Difference

      Mayıs 1, 2026

      Why I Switched From iPhone Hotspot to a 5G Travel Router for Good

      Nisan 18, 2026

      Verizon Offers Free iPad or Apple Watch With New iPhone Purchase: Here’s How It Works

      Nisan 18, 2026
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Analysis of 6 billion leaked passwords exposes the worst choices
    software

    Analysis of 6 billion leaked passwords exposes the worst choices

    By ayaksızOcak 26, 2026Yorum yapılmamış4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Security researchers at Specops Software analyzed a dataset of six billion leaked passwords over the past year, publishing a detailed report that sheds light on persistent password hygiene failures and the evolving threat landscape driven by large-scale credential theft. The findings illustrate how predictable password choices and industrialized malware campaigns continue to undermine account security across both personal and organizational environments.

    The most frequently exposed passwords remain strikingly simple. The top five most stolen credentials in the dataset were “123456,” “123456789,” “12345678,” “admin,” and “Password.” The continued dominance of these strings indicates that a substantial number of users still rely on default-like or sequential number combinations rather than unique, complex credentials. Beyond these, researchers repeatedly observed generic words such as “hello,” “welcome,” “guest,” and “student,” suggesting that compromised accounts likely span not only private users but also corporate systems, educational institutions, and shared or public-access environments.

    Keyboard patterns also remain common. Variants of “qwerty,” derived from the first row of letters on an English keyboard layout, continue to appear frequently in breach data. Another recurring pattern involves passwords ending in “@123” or “@1234,” often preceded by a name, country, or basic greeting such as “hello” or “hola.” According to the researchers, these constructions demonstrate that simply adding a capital letter or special character does little to improve security when users follow predictable templates that attackers can easily model.

    Password length trends in the dataset were also notable. A significant share of passwords analyzed were exactly eight characters long, with just under one-sixth falling into this category. The prevalence of eight-character credentials may be influenced by legacy minimum-length requirements and the fact that common words like “password” fit this length exactly. Shorter passwords of seven characters or fewer were comparatively less common, but length alone did not correlate with strength when combined with highly predictable structures.

    The report also highlights the malware ecosystem responsible for harvesting credentials. Between January and December 2025, five major infostealer families dominated password theft activity in the dataset: LummaC2 with 60,934,662 stolen passwords, RedLine with 31,144,858, Vidar with 5,965,748, StealC with 3,441,423, and Raccoon Stealer with 1,656,673. Collectively, these strains accounted for nearly 100 million compromised login credentials, underscoring the scale at which automated malware campaigns operate. Infostealers typically extract saved browser passwords, session cookies, and other sensitive data from infected machines, often after users are lured via phishing emails, malicious downloads, or fake software updates.

    Researchers warn that less technically experienced users are particularly vulnerable, as they are more likely to fall victim to phishing schemes that deliver infostealer payloads. LummaC2, in particular, is described as an increasingly serious threat due to its rapid rise in activity and the broader trend of malware operators offering bundled, subscription-style toolkits that lower the barrier to entry for cybercriminals.

    To mitigate risk, the report emphasizes the need for stronger credential practices at both the individual and organizational level. Unique, high-entropy passwords that do not follow common patterns are essential, and password managers are recommended to generate and securely store credentials. Enabling two-factor authentication adds a critical additional layer of defense, reducing the impact of password exposure alone. Users are also advised to avoid reusing credentials that have appeared in past breaches and to check for exposure using breach-notification services such as Have I Been Pwned.

    Regular password updates can further limit the window of opportunity for attackers using previously stolen data. Organizations, in particular, are encouraged to enforce password policies that define complexity requirements and rotation schedules, while also investing in user education to reduce susceptibility to phishing and malware infections. Together, these measures address both the human and technical factors that continue to drive large-scale credential compromise.

    Post Views: 106
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    ayaksız
    • Website

    Related Posts

    Anthropic’s Claude Security Tool Analyzes Codebases to Detect Vulnerabilities and Prioritize Fixes

    Mayıs 1, 2026

    Microsoft’s Windows Insider Program Finally Becomes More Streamlined and User-Friendly

    Nisan 11, 2026

    Microsoft launches tool to gather user feedback on Windows issues

    Nisan 8, 2026
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2026 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.