The 25 Worst Passwords Of 2013 – “password” Is Not #1

Use Netsparker


The worst passwords of 2013 – really, more like the most common. The majority come from the massive Adobe leak, which contributed over 40 million passwords and skewed the data a fair bit pushing “photoshop” and “adobe123” into the list.

Most of them are no surprise though, we published the top 10 most common passwords back in 2006, and although it’s rather UK-centric, it did contain “password”, “123”, “123456”, “letmein”, “qwerty” and for some reason both the old list and this one contain “monkey”.

“123456” is finally getting some time in the spotlight as the world’s worst password, after spending years in the shadow of “password.” Security firm Splashdata, which every year compiles a list of the most common stolen passwords, found that “123456” moved into the number one slot in 2013. Previously, “password” had dominated the rankings.

The change in leadership is largely thanks to Adobe, whose major security breach in October affected upwards of 48 million users. A list of passwords from the Adobe breach had “123456” on top, followed by “123456789” and “password.” The magnitude of the breach had a major impact on Splashdata’s results, explaining why “photoshop” and “adobe123” worked their way onto this year’s list.

Fans of “password” could reasonably petition for an asterisk, however, given that the stolen Adobe passwords included close to 100 million test accounts and inactive accounts. Counting those passwords on the list is kind of like setting a home run record during batting practice. Don’t be surprised if “password” regains the throne in 2014.

It’s amazing to think in this day and age, with the amount of news coverage about hacking that people still use such simplistic passwords. Especially when they are dealing with accounts that have billing information/credit card details.

Plus the proliferation of fairly easy to use password generators and storage tools (KeePass/LastPass/PassPack/1Password etc). I’ve been trying a few of them out lately, and I’m favouring Passpack – although it changed hands lately and development has slowed down for a while.


Weaker passwords are more susceptible to brute-force attacks, where hackers attempt to access accounts through rapid guessing. And when encrypted passwords are stolen, weaker ones are the first to fall to increasingly sophisticated cracking software.

As always, Splashdata suggests avoiding common words and phrases, and says that replacing letters with similar-looking numbers (such as “3” instead of “E) is not an effective strategy. Instead, consider using phrases of random words separated by spaces or underscores, and using different passwords, at least for your most sensitive accounts. Password management programs such as LastPass, KeePass and Splashdata’s own SplashID can also help, as you only have to remember a single master password.

Here are the passwords:

1. 123456
2. password
3. 12345678
4. qwerty
5. abc123
6. 123456789
7. 111111
8. 1234567
9. iloveyou
10. adobe123
11. 123123
12. admin
13. 1234567890
14. letmein
15. photoshop
16. 1234
17. monkey
18. shadow
19. sunshine
20. 12345
21. password1
22. princess
23. azerty
24. trustno1
25. 000000

Source: Network World

Posted in: Password Cracking, Privacy, Web Hacking

, , , ,


Latest Posts:


Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.
testssl.sh - Test SSL Security Including Ciphers, Protocols & Detect Flaws testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
testssl.sh is a free command line tool to test SSL security, it checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more.
Four Year Old libSSH Bug Leaves Servers Wide Open Four Year Old libssh Bug Leaves Servers Wide Open
A fairly serious 4-year old libssh bug has left servers vulnerable to remote compromise, fortunately, the attack surface isn't that big as neither OpenSSH or the GitHub implementation are affected.
CHIPSEC - Platform Security Assessment Framework CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.


4 Responses to The 25 Worst Passwords Of 2013 – “password” Is Not #1

  1. mick January 24, 2014 at 8:37 am #

    In all fairness though, how many of these are used to access accounts that ACTUALLY matter to these people? I’m guilty of using 123456 and qwerty on sites that FORCE me to sign up to view/download/consume content.

    I think a better study would be to only include accounts that have financial and/or private/sensitive information (such as CC#’s, SS#’s, email, other password access etc).

    • Darknet January 24, 2014 at 2:01 pm #

      That’s true mick, but that’s why I suggest using something like Passpack – you can use secure (and more importantly, different) passwords for every site. Which, even if a breach does occur, reduces your risk surface dramatically.

      • mick January 26, 2014 at 6:59 am #

        Ahh, of course. For sites that matter. Again, if I’m told to sign up to a website to download some crappy software that I don’t really need or to read some forum post that I can’t see without registration, I always use a secondary email address and a shitty password.

        However, if it’s something that’s actually important to me, I always choose unique passwords per site and depending on what it is, I’ll store it in a password DB.

        • Darknet January 27, 2014 at 1:21 pm #

          Yah, I do that too – the main problem is people use the same or a variation of the same password for all sites (if they matter or not). People reading this site are generally already a step ahead of the curve ;)