Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Analysis of 6 Billion Passwords Shows Stagnant User Behavior

Posted on January 21, 2026January 21, 2026 By CWS

Regardless of years of safety consciousness efforts, an evaluation of 6 billion credentials leaked in 2025 confirms that poor password hygiene persists, as easy numeric sequences and customary phrases stay the first alternative for hundreds of thousands of customers.

The information comes from a report revealed by password administration agency Specops Software program primarily based on an evaluation performed by the menace intelligence workforce of its mum or dad firm, Outpost24. 

The evaluation discovered that the 5 most typical passwords compromised in 2025 have been ‘123456’, ‘123456789’, ‘12345678’, ‘admin’, and ‘password’. 

For a few years these passwords have been named as the commonest credentials and the newest knowledge signifies little change in person habits. 

Whereas passwords comparable to ‘123456’ are sometimes used for private accounts, ‘admin’ and ‘password’ are sometimes default credentials for networking tools, IoT gadgets, and industrial management programs (ICS) utilized in enterprise environments. 

The failure to vary these credentials can allow entry to crucial programs and have vital implications for a corporation.Commercial. Scroll to proceed studying.

“In enterprise environments, this creates an actual danger that malware-stolen credentials are reused as Lively Listing (AD), digital non-public community (VPN), or cloud id passwords, giving attackers trusted entry to company programs,” Specops mentioned in its report.

Most of the analyzed passwords have been barely extra complicated than ‘123456’ and ‘admin’, however nonetheless contained predictable base phrases comparable to ‘admin’, ‘visitor’, ‘qwerty’, ‘secret’, ‘Welcome’, ‘scholar’, ‘hey’, and ‘password’.

“The repeated look of phrases comparable to password and hey suggests operational relatively than private use. Evaluation of the five hundred most steadily recovered passwords reveals a transparent bias towards purposeful credentials tied to infrastructure, VPNs, and inside providers, together with variations of admin, root, and person,” Specops mentioned. 

The corporate has additionally noticed regional and language-linked patterns within the compromised passwords, together with ‘Pakistan123’ and ‘hola1234’. Title-based patterns have additionally emerged, with examples together with ‘Kumar@123’ and ‘Rohit@123’. 

Many of those compromised passwords have been stolen by malware, and essentially the most lively (primarily based on the variety of stolen credentials) was Lumma, adopted by RedLine.

Specops identified that even in organizations which have adopted phishing-resistant and passwordless authentication passwords are seemingly nonetheless used for legacy programs, service accounts, and directory-based authentication. 

The safety agency recommends a layered protection that includes steady monitoring of compromised credentials, the blocking of predictable patterns at creation, and the enforcement of phishing-resistant MFA and powerful id verification throughout all high-risk entry paths and restoration workflows.

Associated: Instagram Fixes Password Reset Vulnerability Amid Consumer Information Leak

Associated: Feds Seize Password Database Utilized in Huge Financial institution Account Takeover Scheme

Associated: SonicWall Prompts Password Resets After Hackers Acquire Firewall Configurations

Security Week News Tags:Analysis, Behavior, Billion, Passwords, Shows, Stagnant, User

Post navigation

Previous Post: Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
Next Post: Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System

Related Posts

Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC Security Week News
Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers Security Week News
US Indicts Extradited Ukrainian on Charges of Aiding Russian Hacking Groups Security Week News
New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches Security Week News
Ex-WhatsApp Security Chief Sues Meta Over Vulnerabilities, Retaliation Security Week News
Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Oracle’s First 2026 CPU Delivers 337 New Security Patches
  • Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior
  • Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Oracle’s First 2026 CPU Delivers 337 New Security Patches
  • Hackers Extensively Abuses Visual Studio Code to Execute Malicious Payloads on Victim System
  • Analysis of 6 Billion Passwords Shows Stagnant User Behavior
  • Chainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark