Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google: Cloud attacks exploit flaws more than weak credentials

    Google upgrades Gemini for Workspace allowing it to pull data from multiple apps to create Docs, Sheets, Slides and more

    Live Nation settlement avoids breakup with Ticketmaster

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Google: Cloud attacks exploit flaws more than weak credentials

      March 10, 2026

      Could this be the key to eternal storage? Experts claim new DNA HDD can be ‘erased and overwritten repeatedly’

      March 9, 2026

      Need more storage? Get a lifetime of 10TB cloud space for just $270.

      March 8, 2026

      Google PM open-sources Always On Memory Agent, ditching vector databases for LLM-driven persistent memory

      March 8, 2026

      Regulate AWS and Microsoft, says UK cloud provider survey

      March 8, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      Google upgrades Gemini for Workspace allowing it to pull data from multiple apps to create Docs, Sheets, Slides and more

      March 10, 2026

      Live Nation settlement avoids breakup with Ticketmaster

      March 10, 2026

      NVIDIA is reportedly working on its own open-source AI agent platform

      March 10, 2026

      GeForce Now adds GOG syncing and 90fps game streaming in VR headsets

      March 10, 2026

      Meta is buying Moltbook, the ridiculous social network populated by AI bots

      March 10, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»6 billion leaked passwords reveal the ones you should never, ever use
    Technology

    6 billion leaked passwords reveal the ones you should never, ever use

    TechAiVerseBy TechAiVerseJanuary 23, 2026No Comments4 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    6 billion leaked passwords reveal the ones you should never, ever use
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    6 billion leaked passwords reveal the ones you should never, ever use

    Summary created by Smart Answers AI

    In summary:

    • PCWorld reports that analysis of 6 billion leaked passwords reveals the top stolen credentials are predictable sequences like ‘123456’, ‘password’, and ‘admin’.
    • Five major infostealer malware families, led by LummaC2 with over 60 million stolen passwords, compromised nearly 100 million login details in 2025.
    • Users should employ password managers, enable two-factor authentication, and avoid common eight-character patterns to protect against increasingly sophisticated cybersecurity threats.

    Over the course of the past year, security researchers at Specops Software examined six billion leaked passwords and subsequently published a comprehensive report on their findings. This report not only provides insight into the most commonly used passwords, but also into the current threat posed by leaks.

    These are the most frequently stolen passwords

    Unfortunately, the top five most stolen passwords show that few users have learned their lesson in recent years. As before, the passwords are as follows:

    1. 123456
    2. 123456789
    3. 12345678
    4. admin
    5. Password

    It’s alarming that most people apparently do not even bother to choose individual words as passwords. In addition to the five most common passwords, the researchers also frequently discovered password combinations with words such as hello, welcome, guest ,or student.

    This suggests that these are not only private accounts, but also company, university or public access data. The ever-popular “qwerty” is also represented again, i.e. simply the first six letters of a keyboard that uses an English layout.

    Passwords ending in “@123” or “@1234” are also frequently used. These are often preceded by a name, a country or a standard word such as “hello” or “hola”. Here, too, users are proving to be rather uncreative. The researchers also point out that it is not enough to use “more complex passwords” with a capital letter and a special character if they always follow the same pattern.

    Interestingly, most of the passwords in the analysis are exactly eight characters long. Just under a sixth reach this length, but this is probably due to the fact that “password” has exactly eight letters. Shorter passwords with seven or fewer characters are comparatively unpopular.

    These are the most dangerous infostealers

    In addition, the researchers indicated which infostealers stole the most data from the set between January and December 2025:

    • LummaC2: 60,934,662 stolen passwords
    • RedLine: 31 ,144,858 stolen passwords
    • Vidar: 5,965,748 stolen passwords
    • StealC: 3 ,441,423 stolen passwords
    • Raccoon Stealer: 1 ,656,673 stolen passwords

    Together, these five malware families alone are responsible for the theft of nearly 100 million login details. Password leaks therefore often occur on a large scale and affect millions of people at once, as this FBI-powered leak in December shows.

    Less tech-savvy users, who are often victims of phishing campaigns, are said to be particularly at risk. Researchers also consider the threat posed by Lumma Stealer to be particularly serious, as it has risen significantly in the list of the most dangerous programs. The top providers of info stealers are also developing increasingly effective packages that bundle various offerings.

    How to protect yourself

    Both private users and system administrators should make sure to use secure and complex passwords that do not follow a common pattern. It is best to use a password manager to create and store important access data.

    In addition, it can help to use two-factor authentication. Also, avoid passwords that have already been leaked. For example, you can check whether your password has been stolen in the past via the Have I Been Pwned website.

    Regular password resets and updates should also protect against theft. Admins can set specific guidelines for this, for example, once a year or once every x months.

    This article originally appeared on our sister publication PC-WELT and was translated and localized from German.


    Author: Laura Pippig
    , Staff Writer, PC-WELT

    Laura is an enthusiastic gamer as well as a movie and TV fan. After studying communication science, she went straight into a job at PCMagazin and Connect Living. Since then, she has been writing about everything to do with PCs and technology topics, and has been a permanent editor at our German sister site PC-WELT since May 2024.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleA Lenovo update hints at Nvidia Arm CPUs coming soon
    Next Article Tesla Malaysia unleases Model 3 Standard RWD and Model Y Long Range RWD
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Google upgrades Gemini for Workspace allowing it to pull data from multiple apps to create Docs, Sheets, Slides and more

    March 10, 2026

    Live Nation settlement avoids breakup with Ticketmaster

    March 10, 2026

    NVIDIA is reportedly working on its own open-source AI agent platform

    March 10, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025709 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025298 Views

    Wired Headphones Are Making A Comeback, And We Have Gen Z To Thank

    July 22, 2025195 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025168 Views
    Don't Miss
    Business Technology March 10, 2026

    Google: Cloud attacks exploit flaws more than weak credentials

    Google: Cloud attacks exploit flaws more than weak credentials Hackers are increasingly exploiting newly disclosed…

    Google upgrades Gemini for Workspace allowing it to pull data from multiple apps to create Docs, Sheets, Slides and more

    Live Nation settlement avoids breakup with Ticketmaster

    NVIDIA is reportedly working on its own open-source AI agent platform

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Google: Cloud attacks exploit flaws more than weak credentials

    March 10, 20263 Views

    Google upgrades Gemini for Workspace allowing it to pull data from multiple apps to create Docs, Sheets, Slides and more

    March 10, 20260 Views

    Live Nation settlement avoids breakup with Ticketmaster

    March 10, 20263 Views
    Most Popular

    Best TV Antenna of 2025

    March 13, 20250 Views

    Best Internet Providers in Bowling Green, Kentucky

    March 13, 20250 Views

    The Players Championship 2025: TV Schedule Today, How to Watch, Stream All the PGA Tour Golf From Anywhere

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.