Password Header

For the 5th year in a row, "123456" is most used password, with "password" coming in at second place. Even in the wake of a constant stream of data breaches, hacks, and ransomware attack reports people continue to utilize weak passwords that not only put their information at jeopardy, but also their organization's data.

In SplashData's 8th annual worst passwords list, the password management company analyzed more than 5 million leaked passwords to come up with their list of most used passwords. According to their report, the top 10 most used passwords are:

  1. 123456
  2. password 
  3. 123456789
  4. 12345678
  5. 12345
  6. 111111
  7. 1234567 
  8. sunshine
  9. qwerty
  10. iloveyou

"Bad habits die hard, according to SplashData’s eighth annual list of Worst Passwords of the Year," stated SplashData's press release. "After evaluating more than 5 million passwords leaked on the Internet, the company found that computer users continue using the same predictable, easily guessable passwords. Using these passwords will put anyone at substantial risk of being hacked and having their identities stolen."

Password management company Dashlane also released a report this week that focuses on the biggest password mistakes of the year. Topping the list is Kanye West, who in full view of television cameras entered the password "000000" into his cell phone to unlock it.

The full list of Dashlane's "Worst Password Offenders" is listed below.

  1. Kanye West: West tops the list of offenders by entering in a password of "000000" to unlock his mobile phone while meeting with President Trump in a room full of television cameras.
  2. The Pentagon: In a Government Accountability Office (GAO) report, it was found that "credentials management being so poor that one team was able to guess the admin password of a system in nine seconds. The most likely reason for this was that the administrators did not change the default passwords in the software installed on the weapon system."
  3. Cryptocurrency owners: As the value of cryptocurrencies boomed, users discovered that they no longer remembered the passwords to access their wallets. Some owners who wanted to sell went as far as hiring hypnotists to help remember their passwords.
  4. Nutella: Nutella gave out the posted a bizarre tweet telling advising their followers to use "Nutella" as their password. Nuff said on this one.
  5. U.K. Law Firms: Over one million corporate email and password combinations from 500 of the UK's top law firms were discovered on the dark web.
  6. Texas: Texas left the voter records of over 14 million residents exposed on a server without a password.
  7. White House Staff: A DC staffer wrote his email login and password on official White House stationary and then left it at a Washington, D.C. bus stop. Oops.
  8. Google: An engineering student from India was able to access a TV broadcast satellite after logging into Google admin pages using a blank username and password.
  9. United Nations: U.N. staff were using Trello, Jira, and Google Docs to collaborate on projects, but forgot to secure them with a password! This allowed anyone to access the docs that contained confidential information, communications, and plaintext passwords.
  10. University of Cambridge: The university added a plaintext password to a GitHub project that allowed anyone to access the data of millions of Facebook users being studied by the university’s researchers.

As always, users should create strong and unique passwords at every site they visit. These passwords should contain at least 8 characters, upper and lower case letters, numbers, and symbols such as %$#!. To aid them in remember unique passwords at each site, they can use a password management utility to store the passwords.

Related Articles:

The Dark Web is Getting Darker - Ransomware Thrives on Illegal Markets

Password Reset Calls Are Costing Your Org Big Money

How Windows 11's Enhanced Phishing Protection guards your password

How the "pizza123" password could take down an organization

Text message verification flaws in your Windows Active Directory