You'll never guess what the most common passwords are. Oh, wait, yes you will
- Reference: 1762437605
- News link: https://www.theregister.co.uk/2025/11/06/most_common_passwords/
- Source link:
Tech advice website Comparitech on Thursday [1]published the 100 most common passwords based on a deep dive into more than two billion passwords leaked on breach forums in 2025.
The three mentioned above all finish in the top ten, along with various variations of the numerals 1-9 in ascending sequential order.
[2]
Of course, no list of common passwords would be complete without such innovations as Aa123456, the sixth most common entry on the list, or the radically different Aa@123456, which came in at the 13th position. Combinations of qwerty and other keys sequentially in the first row of the keyboard were also common entries. Spice them up with a few numbers, like 1q2w3e4r, and you have yourself another popular combination.
[3]
[4]
Funnily enough, gin - yes, just straight gin - was the 29th most popular entry, while the somewhat more unique, but clearly still popular India@123 ranked 53rd. In a nod to Gen-Z, minecraft (lowercase "m"), the title of the popular Microsoft voxel building sandbox game, rounded out the top 100, appearing 69,464 times in a list of two billion passwords.
What does all this mean? According to Comparitech, it's "a showcase of human laziness" when it comes to staying safe online.
[5]
A full quarter of the passwords on the list, the study found, consisted solely of numbers, making them quite easy to suss out. Thirty-eight percent specifically contained the string 123, and another two percent included the inverse, 321.
"Modern password cracking programs make short work of weak passwords," the site said in what's surely [6]not a shocker to El Reg readers. "Common passwords are easily guessed. Short passwords are easily brute-forced."
The longer the better - and mixing it up doesn't hurt, either
[7]
So what's a user, or administrator responsible for ensuring users have good passwords, to do?
First and foremost, consider [8]biometric passkeys , which eliminate the need for passwords entirely. If that's not possible, there's always nice, long passphrases - depending on [9]who you ask, those are preferential to a password full of random numbers and letters since they're longer, easier to remember, and theoretically harder to crack.
And size does matter.
"No matter who you ask, the most important factor is length. Length is more important than complexity and randomness," Comparitech consumer privacy advocate Paul Bischoff told us in an email.
Of course, adding a random character into a long passphrase doesn't hurt either, Bischoff noted - so instead of "icantbelievewerestilltellingyouthis," try "icantbelivewerestilltellingy0uthis," as even that simple change makes it far less likely to be guessed.
[10]What the Plex? Streaming service suffers yet another password spill
[11]With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare
[12]No, eight characters, some capital letters and numbers is not a good password policy
[13]Samsung admits Galaxy devices can leak passwords through clipboard wormhole
Using gibberish passwords and relying on a password manager is still better than qwerty123, of course, and Bischoff says that goes for browser-based password management, too. You're still taking matters into your own hands, of course, as Chrome updates [14]have been known to break Google Password Manager, and password manager apps aren't [15]100 percent secure either.
Whatever you do, don't let yourself be caught with a password on Comparitech's list, and if it's your responsibility to set password complexity rules, make sure you're setting good ones.
When enterprise environments don't enforce good password requirements, users are more likely to slack off on setting a solid one, Bischoff explained.
"The most secure passwords will be set by the users who have the strictest password requirements," the privacy advocate added. ®
Get our [16]Tech Resources
[1] https://www.comparitech.com/news/minecraft-qwerty-and-india123-among-2025s-most-common-passwords-report/
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aQzUJ1MPZ8BoBRDdM-s1dQAAAQU&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aQzUJ1MPZ8BoBRDdM-s1dQAAAQU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aQzUJ1MPZ8BoBRDdM-s1dQAAAQU&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aQzUJ1MPZ8BoBRDdM-s1dQAAAQU&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[6] https://www.theregister.com/2024/05/10/ncsc_entry_code/
[7] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aQzUJ1MPZ8BoBRDdM-s1dQAAAQU&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[8] https://www.theregister.com/2024/12/18/microsoft_passkey_push/
[9] https://xkcd.com/936/
[10] https://www.theregister.com/2025/09/09/plex_breach/
[11] https://www.theregister.com/2025/02/26/hibp_adds_giant_infostealer_trove/
[12] https://www.theregister.com/2018/08/28/bad_passwords_never_go_out_of_fashion/
[13] https://www.theregister.com/2025/04/28/security_news_in_brief/
[14] https://www.theregister.com/2024/07/29/google_password_manager_outage/
[15] https://www.theregister.com/2022/12/23/lastpass_attack_update/
[16] https://whitepapers.theregister.com/
Re: How many systems allow unlimited login attempts ?
Limiting login attempts doesn't help when someone has broken into a system and stolen a hashed password file. You can have as many goes as you like to match the hash, and then use the result to login.
Re: How many systems allow unlimited login attempts ?
True, but 'broken into a system and stolen a hashed password file' is quite an unusual threat model: if they've broken into the system and exfiltrated something that sensitive, which is generally protected by default much better than people protect important user files, then they've already got enough access to the system that worrying about them pretending to be users is the least of your concerns.
Re: broken into a system and stolen a hashed password file.
I notice you avoided the point about implementing the ISO standard for authentication ?
Re: How many systems allow unlimited login attempts ?
My password is Hunter2.
As you can see, when I type Hunter2, you just see *******. That's because I use the latest in SHA-256 fast-hashing software built into a browser add-on that automatically detects when I type any password (including Hunter2) and turns it into *******
That's why I can type Hunter2 as many times as I like and you can't see it.
Hunter2
Hunter2
Hunter2
See?
I would use very long passphrases, if not for the fact that almost all systems demand numbers, mixed case and punctuation at the very least, and some of them have a max password length.
My preference is car number plates, once in lower case & once with the shift key down. It helps that a) I mostly work with full sized keyboards and b) am a raging petrolhead with a gift for remembering car registrations going back decades so don't need to use my current car. Also means I can leave myself a postit note with just "blue maxi" or "white 504 estate" on my monitor and it's still pretty secure.
I used to used a job ref (similar in complexity to a car reg plate) for the monthly password then kept a piece of printout of it on my desk
@ J P
Except not if you're reusing that password on multiple sites and just one of them gets breached.
That is the correcthorsebatterystaple response.
Mixed case is simple - the first letter will be a capital. Oh yeah, that adds zero entropy. In the same way as people adding !1 at the end is so predictable that it doesn't really add anything.
Password rules make for weaker passwords
Mixed case, numbers, symbols, but cannot contain some symbols and no spaces, and must change every month?
Fine: "November2025!" is good for this month.
When will people understand that allowing for a long passphrase with spaces and NOT FORCING CHANGES is the way to have good passwords?
Re: Password rules make for weaker passwords
I particularly like
What could possibly be wrong with this?!
In effect it is as strong as MyPassword# but if you are going to force me to change password every month, not allow me a password manager on my corporate system and not allow me to right it down then I have to have some strategy for remembering it, or I will frequently resetting the password.
Re: Password rules make for weaker passwords
Bandname, album, year of release.
Make & model of vehicle & year of manufacture.
UK railway stations.
Special characters substituting regular letters, renewal time I just change where I press the shift key as its all largely muscle memory..
TFL
I created an account on the Transport for London web site today. It only allows letters and digits in the password, no symbols, not even punctuation.
-A.
Most Popular Password : 123456
Seriously, how difficult is it to add an extra digit, such as ; 1234567
People are so lazy nowadays.
Re: Most Popular Password : 123456
Come on, everywhere requires 8 characters and punctuation: 1234567!
Re: Most Popular Password : 123456
I thought the correct 8 character password was:
SnowWhiteandthe7Dwarves
Re: Most Popular Password : 123456
How did you get on my wifi?
Re: Most Popular Password : 123456
i2EA567
Still harping over forum passwords
Forum passwords, often enough with a "Register to read this thread!" requirement, where we the user don't want the account, wish we didn't have to create it at all, and when it *inevitably* leaks, others are harping over just-how-bad those passwords are. Glad they didn't leak my *real* passwords!
Lets face it. These password breaches mostly aren't for things that people care about. People being users or admins. Forums, single-use accounts, throw-aways, etc etc.
With the odd idiot who makes their work password 1234Five, but those are the exceptions.
Where's the breakdown of "Type system from which passwords were leaked" ? Or, "Systems having password hashing, password salting, and separate password storage from data storage"?
Re: Still harping over forum passwords
This is indeed so much true. If I have to register to do something stupid and one-time, I usually enter a throwaway email and an idiotic password. And who cares if it gets leaked.
Re: Still harping over forum passwords
Good for a techy user.
What proportion of normal users would even think of this let alone implement it.
Wherever possible avoid giving the user the opportunity to screw up. They will, of course, still screw up, just less frequency.
Seems the Louvre's password was 'Louvre', except for their Thalys systems, which was 'Thalys'.
Well, that still needed a forklift truck to be broken...
So that's 2 factor authentication ?
An easy password but the keypad is out of reach
Forcing regular change is counterintuitive
There's a site I use for work, they force a password change every 60 days.
If that isn't bad enough, I only use the site once a term, so I have to change the password every single time I use the website, and I cant use any previous passwords.
I imagine most people just type something random into the password box, then use the forgotten password routine when they log in again 120 days later...
Re: Forcing regular change is counterintuitive
I left one company, with my current password set to
But then, I usually use Safari generated passwords for websites. One turned out was used in a breach. So I know one company that most definitely stored my password as clear text.
Re: Forcing regular change is counterintuitive
Or they used reversable encryption, along side the encryption key. While they might have been idiots, they might simply have been stupid.
Password fatigue
every **** thing requires logins and complicated passwords and password managers do not really help becasue, if you don't have the password manager handy, you are out of luck.
I have mixed feelings for 2FA with OTP that require an internet connection with the phone.
Sometimes theoretial higher security turns into actual lower security. Force me to write a long passphrase and let me be, the requirement for symbols, numbers etc. is often the reason users picks asdfgh123! as a secure password.
Re: Password fatigue
So, I run my own password manager, its a commercial one, and its the free version. I also modified the tomcat configuration to require a client certificate. This means you can't actually connect to it, and I can reach it from anywhere.
a random character
"icantbelievewerestilltellingyouthis,"
"icantbelivewerestilltellingy0uthis,"
which of the two changes were you referring to?
Re: a random character
"icantbelieveitsnotbutter" - We were told that this password was discussed in the Australian parliament!
--------> Mine's the one covered in a suspiciously yellow, slippery substance!
Where are they getting the passwords from?
They say "Comparitech researchers aggregated more than 2 billion real account passwords leaked on data breach forums in 2025". Surely this means that large numbers of systems are still storing passwords in plain text rather that salted/peppered hashes? Is that not the news story, rather than "people are using weak passwords"?
India@123
India all out for 123 against England.
England@789
Re: India@123
England beating India? That never happens.
What about username?
Why can't more sites allow logins with non-email usernames? Yes, folks get frustrated by name collisions (I sure do), but my email address is far from secret. About the only place I get to make my username is at financial sites. And I make my usernames as obscure as allowed when given the chance.
I figure it can't hurt to use as many pieces of furniture as I can to block the door.
Re: What about username?
Seconded, even worse I've got one where I ended up having to set up a second email address for myself just to log in to a support site.
We have an ERP system for one group company, no problem with my main email address for the support site.
We then implemented the same ERP at another group company but with the financials from the same provider. For no reason I could see they couldn't add the financials package onto my original support account so I had no choice but to set up a new one, and it has to be a live email address. It suited me slightly to keep things separate so easy enough to set up a group mailbox but I can see that in a larger environment it might have caused problems.
So now I have to log in to the support with the correct email address depending which company I'm dealing with at the time.
Re: What about username?
Even more annoying are the sites that require an email for the username ..... and then tell me that I have not entered a valid email address! The most annoying being my local council.
I have a domain in the .email TLD, and generate a unique email address for each site that I login to. That way if I start getting spammed I know who lost or handed out the email address.
But I occasionally run across sites that say that
123456
That's amazing. I've got the same combination on my luggage.
Re: 123456
Hail Skroob!
These are the most commonly leaked passwords, not the most common passwords.
A strong password that was users as often as 12345678 wouldn't make the list, because it is leaked less often.
Doesn't matter how strong the password is if the database it's stored in gets hacks.
TL;DR, you're wrong.
I like the sites that review your password and refuse to accept it because it is too simple, wouldn't take much effort to add a database of top 500 common passwords and blacklist them. I get peeved when a site wont let my password manager use a 16 character password that contains uppercase lowercase numerical and special characters and then I have to tell the password manager to dumb it down.
Yes my password manager password is a lonnnggggg passphrase but its muscle memory now and I change it every so often.
"Correct horse battery staple" and variations don't appear in Comparitech's top 100 but they're common enough that they're best avoided.
One of my gripes is that a lot of sites encourage people to register so they can capture personal information and ultimately use it for advertising. Some news sites (present company excepted) are particularly bad for this. Being able to track demographics and page views down to an individual level might be nice to have for the ad tech industry but it can have consequences if it makes people use insecure passwords or could be stolen.
Avoid plain biometrics
In the Sci-Fi novel "One of us" the point is made that a plain biometric for a passcode is a very, very bad idea. The book plot starts with a small-time criminal suddenly discovering that his bank account is empty and he is effectively penniless. He asks a local fence for a loan, and instead receives a finger.
This is the severed finger of someone with no family and few friends, detached from its original (sadly deceased) owner and attached to a small life support device. Quick, untraceable money for as long as the owner's death remains undiscovered because in this book banks are stupid and allow pure biometric ID.
xkcd
According to this (and I have no idea of it’s correct) we’re all doing it wrong
https://xkcd.com/936/
Not bothered
I sometimes use 'drowssap' against the more tiresome websites.
How many systems allow unlimited login attempts ?
Which would mitigate a lot of risk.
Come to that how many systems are there that don't implement the ISO standard for authentication ?