Tue | Feb 12, 2019 | 9:10 AM PST

Although bad passwords are a gateway to account compromise, users continue to opt for easy-to-remember options rather than creating strong, unique credentials. SplashData’s annual “Worst Passwords List” illustrates the long-standing nature of the problem; though there were some newcomers to 2018’s top 25 rankings, “123456” and “password” continue their undisputed reign (as they have for eight consecutive years).

But the issue goes deeper than these two offenders, as can be seen in the following chart, which presents the top 25 worst passwords from the past four rankings. The 2018 passwords in bold have been in the top 25 at least twice since 2015 (though most of these are third- or even fourth-time offenders). One trend to note for this year is the resurgence in popularity of some passwords (such as “111111” and “sunshine”) that haven't been among the top ranks since 2015 or 2016.

 Rank

2018

 2017

 2016

2015

 1

123456

123456

 123456

123456

 2

password

password

 password

password

 3

123456789

12345678

 12345

12345678

 4

12345678

qwerty

 12345678

qwerty

 5

12345

12345

 football

12345

 6

111111

123456789

 qwerty

123456789

 7

1234567

letmein

 1234567890

football

 8

sunshine

1234567

 1234567

1234

 9

qwerty

football

 princess

1234567

 10

iloveyou

iloveyou

 1234

baseball

 11

princess

admin

 login

welcome

 12

admin

welcome

 welcome

1234567890

 13

welcome

monkey

 solo

abc123

 14

666666 (new)

login

 abc123

111111

 15

abc123

abc123

 admin

1qaz2wsx

 16

football

starwars

 121212

dragon

 17

123123

123123

 flower

master

 18

monkey

dragon

 passw0rd

monkey

 19

654321 (new)

passw0rd

 dragon

letmein

 20

!@#$%^&* (new)

master

 sunshine

login

 21

charlie (new)

hello 

master

princess

 22

aa123456 (new)

freedom 

hottie

qwertyuiop

 23

donald (new)

whatever 

loveme

solo

 24

password1

qazwsx 

zaq1zaq1

passw0rd

 25

qwerty123 (new)

trustno1 

password1

starwars

SplashData analyzed more than five million leaked passwords for this year’s list, noting that most were from users in North America and Western Europe. (They also noted that exposed passwords from hacks of adult websites were not included in the analysis.) Like last year, 18 of this year’s top 25 are repeat offenders, and the variety seen in the new entrants show users' misguided attempts to add complexity. For example, the seemingly complicated "!@#$%^&*" is simply the “Shift” symbols over numbers 1 through 8 on a standard keyboard.  

In speaking about the list, Morgan Slain, SplashData CEO, cautioned, “Hackers have great success using celebrity names, terms from pop culture and sports, and simple keyboard patterns to break into accounts online because they know so many people are using those easy-to-remember combinations.” In fact, it’s estimated that 10% of people have used at least one of this year’s 25 worst passwords, and that nearly 3% have used “123456.”

How can you help break the bad password cycle?

As you consider your comfort level with 10% of your employees using one (or more) of these passwords to safeguard their accounts, you should also consider what you’re doing to help move the dial on password hygiene. Instead of chalking these behaviors up to laziness, think instead about how daunting a task it is to create, remember, and manage a stable of complex passwords—a stable that only continues to change and expand—while also being told that you can’t reuse passwords or write anything down.

End users will always be the key to proper application of password best practices, and security awareness training remains the best avenue for influencing behaviors and reducing risk. Here are some proactive ways to break the cycle:

  • Explain the importance of good password hygiene to employees in terms they will understand, using example that will resonate. Don’t assume users know that compromised credentials are for sale on the black market, tell them that (and use examples). And illustrate the dangers of reusing the same password across multiple logins, particularly those that provide access to sensitive information or financial accounts.
  • Provide interactive training about the techniques employees can use to create and remember more complex password constructions. The best options are those that encourage users to practice techniques and avoid pieces of personal data (like birthdays) that are regularly available on social media.  
  • Offer guidance and recommendations about extra tools that can help them protect their data and yours. Explain how multi-factor authentication works, where they can employ it, and why it’s worth the extra few seconds to use it. And offer your recommendations about password management tools; your expertise and knowledge is valued by many in your organization (though you may not realize it).
  • Don’t underestimate your employees’ desire to learn about these best practices. Not everyone will be receptive, but many will be—and they’ll be happy to share the information with family and friends. When users truly understand why you ask them to create strong passwords (and regularly change them), they will be less inclined to regard these actions as nuisance activities.
Looking for more information and advice about addressing end-user risk? Register for the 2019 State of the Phish Report SecureWorld web conference on January 30th.
Comments