Categories: Security

SplashData published the list of Worst passwords of 2014

SplashData has published its annual report on the used of passwords that includes the list of the Worst passwords of 2014.

Here we are to analyze the annual study published by SplashData, titled “123456” Maintains the Top Spot on SplashData’s Annual “Worst Passwords” List“, on the use of the passwords. Which are the most common passwords used by the users? Despite numerous suggestions, do users use strong passwords?

SplashData has analyzed more than 3.3 million passwords leaked in 2014 which were publicly released, the researchers revealed the top 25 most common passwords.

“The 2014 list of worst passwords demonstrates the importance of keeping names, simple numeric patterns, sports and swear words out of your passwords.” states the report.

The top 25 most common passwords represent 2.2% (72600 passwords) of the overall leaked passwords analyzed by the study.

Comparing the data with results of previous reports issued by SplashData, it is possible to note that only 2.2 percent of passwords now come from that list, this represent a significant decline in the use of weak passwords.

“The bad news from my research is that this year’s most commonly used passwords are pretty consistent with prior years,” said Mark Burnett, author of “Perfect Passwords” (http://www.xato.net). “The good news is that it appears that more people are moving away from using these passwords. In 2014, the top 25 passwords represented about 2.2% of passwords exposed. While still frightening, that’s the lowest percentage of people using the most common passwords I have seen in recent studies.”

People are becoming more aware of the need for strong passwords to protect their digital identity, but it is important to highlight that single factor authentication are not enough to protect us.

“As always, we hope that with more publicity about how risky it is to use weak passwords, more people will start taking simple steps to protect themselves by using stronger passwords and using different passwords for different websites.” said Morgan Slain, CEO of SplashData.

The number of data breaches in still increasing, such as their overall cost, as confirmed by the study published by the Ponemon Institute.

Let’s go deep in the report by starting from the results of the previous year:

and let’s compare it with data emerged from the study of this year:

That’s incredible! The situation hasn’t changed for the top two passwords that remain the same as 2013, ‘123456’ and ‘password’ are still the most used passwords.

The new entries in the “Worst Passwords” list are the world ‘baseball’, ‘dragon’ and ‘football’, extending the analysis to the Top 100 passwords novelties include ‘michael’, ‘mustang’, ‘superman’ and ‘batman.’

Analyzing the list of worst passwords published in the study it is easy to recognize the propensity of users to adopt favorite sport,  birthday date, birth year and baby names as their passwords.

Here’s the complete list.

1) 123456
2) password
3) 12345
4) 12345678
5) qwerty
6) 1234567890
7) 1234
8) baseball
9) dragon
10) football
11) 1234567
12) monkey
13) letmein
14) abc123
15) 111111
16) mustang
17) access
18) shadow
19) master
20) michael
21) superman
22) 696969
23) 123123
24) batman
25) trustno1

The list above shows a resistance on a strong inclination towards numeric patterns, but very dangerous are also passwords composed of sequences such as “qwertyuiop,” which is the top row of letters on a standard keyboard, or in a similar manner, “1qaz2wsx” which comprises the first two ‘columns’ of numbers and letters on a keyboard.

“Don’t use your birthday or especially just your birth year — 1989, 1990, 1991, and 1992 are all in the top 100. While baby name books are popular for naming children, don’t use them as sources for picking passwords. Common names such as “michael,” “jennifer,” “thomas,” “jordan,” “hunter,” “michelle,” “charlie,” “andrew,” and “daniel” are all in the top 50.” continues the study.

If you see one of your passwords in the above list … don’t waste time, change it immediately.

Pierluigi Paganini

(Security Affairs – Worst passwords, Spash data)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Coinbase data breach impacted 69,461 individuals

Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals.…

1 hour ago

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti EPMM, MDaemon Email Server, Srimax Output…

5 hours ago

A critical flaw in OpenPGP.js lets attackers spoof message signatures

A critical flaw in OpenPGP.js, tracked as CVE-2025-47934, lets attackers spoof message signatures; updates have…

6 hours ago

SK Telecom revealed that malware breach began in 2022

South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April…

10 hours ago

4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call

A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…

20 hours ago

China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks

China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an international organization in Saudi Arabia.…

1 day ago