The worst passwords of 2023 are also the most common, "123456" comes in first

Cal Jeffrey

Posts: 4,181   +1,427
Staff member
Facepalm: Unfortunately but not surprising, people in general tend to be careless when it comes to computer security, especially regarding passwords. Pin it on laziness, difficulty remembering complex strings, or simply not caring. Whatever it may be, the most commonly used passwords are also the worst from a security standpoint year after year.

NordPass has published their 2023 edition of the top 200 most common passwords and unsurprisingly very few of the entries are secure. The top 10 can all be cracked in under a second using simple brute-force tools.

The vast majority of the rest are no better. Only a handful would give a hacker a problem for more than a second, and only one – "theworldinyourhand" – is virtually uncrackable. It is the number 173 most common password and would take centuries to guess using brute force.

In 2023, as in past years, consecutive strings of numbers seem to be the people's choice. Selections like "123" (8th), "1234" (5th), "12345" (6th), "123456" (1st), "12345678" (3rd), "123456789" (4th), and "1234567890" (10th) dominate the top 10.

Of course, to satisfy your work's IT admin and fulfill his dumb rules of having a password of at least eight characters containing a minimum of one capital letter, one lowercase letter, and one numeral, you can always use "Aa123456" (9th). That leaves only two passwords in the top 10 that are arguably less lazy than the rest.

The word "password" comes in at number seven, and since credentials are case-sensitive, "Password" with a capital "P" just missed the top 10, ranking 15th. The lowercase version has appeared in the top 10 since 2020 and won first place last year. Apparently, people creating new accounts seem to assume the word in the box in light gray font is a suggestion rather than a label.

The second most common password this year is "admin." NordPass found 4,008,850 instances, surpassed only by the numerals one through six used by over 4.5 million users in the sample. Of course, "admin," as we all know, is the default on many devices, so one could make the case that it is the laziest password of all.

The 2023 list has a few somewhat unexpected examples. Just missing the top 10 at number 11 is "UNKNOWN." While still not very secure, at least it takes about 11 minutes to brute force, which is 11 minutes more than most of the list.

Oddly, adding "123" to the end of "admin" makes it just as secure as "UNKNOWN." Furthermore, putting the "at" symbol (@) between the word and the numbers bumps the hack time up to one hour.

"Eliska81" takes about 3 hours to crack, but one has to ask, how did that become a common password ranked 40th on the list? No fewer than 75,755 people are using "Eliska81" as a password. How does that happen?

Finally, the second most challenging password to crack appears at number 54. While "admintelecom" is nowhere close to the centuries it would take to guess "theworldinyourhand," brute forcing it would still take about 23 days.

There are no valid excuses for poor password choice when so many easy-to-use credential managers are available. A prevalent example is 1Password, which securely stores and automatically enters your login information using only one master password.

Apple customers have even fewer excuses. For Mac, iPhone, and iPad users, the native Keychain app is well integrated, uses your device password or Face ID for access, and syncs your credentials across all platforms with virtually no setup process.

Despite the ease of keeping and storing passwords these days, you can bet your house that next year we'll see a nearly identical list of password shame.

Image credit: Lewis Ogden, Marco Verch

Permalink to story.

 
p1a2s3s4w5o6r7d8

That's mine not it top 20
don't mind if you use it

Thank me later

edit
"seen 176 times before" - I knew it would fail - but not too bad - was a pain to type

password seen 9659365 before

Eliska81 seen 232 times - so my one crap - as using some other metric , source - as says above over 75000 people using it
 
Last edited:
Long passwords are easy to remember as long as I use combos I will never forget and I have had plenty of phone numbers, addresses, etc. that are long defunct
 
May I advice plz?
use an address, like: Liublian0vka#13

im using address for like 15 years, never gets down

using your own address will get you down right here right now
 
One thing that really grind my gears as the IT Specialist in the company, is to have to deal with constant (what I call) 'free' complains about password requirements. What chances are that someone hack into your account? Pretty low, since we are not a high profile company, but they do not understand that this applies for every account that they have outside work. Most people don't give a flying f*** until something happens to them
 
Everytime I see this article I think the same thing: How do they get the passwords to show the data? NordPass produces these reports right? Should we be using NordPass?
 
Everytime I see this article I think the same thing: How do they get the passwords to show the data? NordPass produces these reports right? Should we be using NordPass?
any data is accessible. Its all about trusting who can access it.
 
One overlooked reason as to why some people use weak passwords is that they don't find the account important, unvaluable. If someone breaks in there's nothing interesting to find and it's easy to just create a new one. I don't value all my accounts the same so passwords are not of the same strength.
 
I wonder what affects the cracking time. Why does "vodafone" take 3 hours?
Vodafone would actually be found pretty much instantly, because the name would be included in a dictionary attack, which would be tried first before spending time cracking it
 
My master passwords are usually a snippet of lyrics to a song. I switch lyrics about monthly or quarterly depending on when I remember. This year I am about halfway through AC/DC's "Let There Be Rock." I do of course throw in special characters with the lyrics. But using the lyrics helps me keep the passwords fresh.
 
Phrases are the easiest to remember. I've a 28-character password for TS. No way in hell anyone will guess that one. If you do, let me know. ;) And I've got even longer passwords for other sites. The key is using a phrase makes passwords easy to remember even without a password manager. That advice is consistent with CERT recommendations.

If password managers were not also experiencing hacks, I would agree with the article that using a password manager is the way to go.

Incorrect should be your password. That way, if you type it wrong, it will pop up
and say "your password is INCORRECT".
I tried that. Someone tried to hack a computer of mine, and they figured out the password. ;) :laughing:
 
A long time ago at work I set my phone support verbal password to ‘I don’t know’. The support tech would ask ‘what’s your verbal password please’ and then crack up laughing.
 
Quick tip:

Type your password shifted one letter over on the keyboard.
So "password" becomes "[sddeptf"
"Techspot1" becomes "Yrvjd[py2"
And so on.

Super easy to remember/type and super difficult to crack.
Shoot, even use your own name as your password!
 
Everytime I see this article I think the same thing: How do they get the passwords to show the data? NordPass produces these reports right? Should we be using NordPass?

I was thinking the same thing. They can see / crack their users' passwords??

I never really trusted NordPass before. Even less now!

As to the lazy bunch: use Bitwarden!

It's free, has a great password generator (any length and any variation you want) and works as a perfect extension on many browsers.
 
Someone will actually go testing that pass word on all of your accounts ... and you have a few apparently. Heck, even I tested it to see if it was the one you were using.
https://www.google.com/search?q="kiwigraeme"

On the upside you got me to finally register an account here. :)

I wondered why I wasn't getting my 2FA on my email or phone -better check my bank account thanks
Those have you been pawned websites - put be a good honey trap for hackers to set up - I think they say they keep no logs . Not like websites that kept wrong password attempts/logs in plain text - so useful for hackers to figure out real one

I did check old ones I used -from 20 years ago - like hockeyplayer ( a bit more obscure than that ) - it had been pawned - assume from someone else using it

Plus you old passwords show up on those sites as Online stores , Utility companies compromised the whole lot - no matter how good your one was
 
You know when you think about it someone using "password" for their password might be dense enough that when they saw "enter password" as a prompt... well you know.
 
Back