Consequently,
98.5 % passwords analyzed too:
98.5 % of passwords analyzed are too low to resist an attack
Specops Software reveals the results of an unprecedented. Consequently, study on 10 million passwords from compromised databases. Furthermore, This analysis highlights a worrying reality: only 1.5 % of passwords analyzed meet the criteria of a truly secure password.
Thanks to a visualization in the form of Heatmap. Furthermore, the Specops teams were able to map the high -risk areas depending on the length and complexity of passwords. In addition, Result: an overwhelming majority of combinations used today are easily exploitable by cybercriminals.
“Despite years of training and awareness, many users continue to opt for simple and predictable passwords. However, Our Heatmap gives a clear image of this security deficit -. alert on the urgent need to review internal policies, ”underlines Darren James, Senior Product Manager at Specops.
A concrete definition of a 98.5 % passwords analyzed too “strong” password
For this study. Specops retained a simple but demanding rule:
A password is considered strong if it includes:
● At least 15 characters
● Two different types of characters at least (letters, numbers, symbols, etc.)
Why 15 characters? Because each additional character exponentially increases the number of combinations possible. making the attacks by force brute practically impossible, even with very powerful equipment. By combining length and diversity of characters, we create an almost insurmountable barrier for hackers.
What the study reveals: an alarming inventory
The analysis of the 10 million compromise passwords offers a. representative overview of current practices. Here are the main lessons:
● 98.5 % of passwords analyzed are too low to withstand an automated attack
● Only 3.3 % make more than 15 characters
● 55.3 % use only 98.5 % passwords analyzed too 1. 2 characters
● The most common formats remain passwords of 8 characters, with or without figures
● Less than 16 % of passwords reach an “acceptable” safety level (12+ characters and two types of characters)
The red zone of the Heatmap brings together most of the passwords observed. These passwords are all in a critical vulnerability area: easy to guess. easily recoverable via dictionary attacks, or decryptable in a few minutes by calculation infrastructure.
Why do weak passwords are problematic?
The consequences of low passwords are multiple. and often underestimated:
● Easy front door for hackers: once a compromised identifier, the rest of the network becomes vulnerable
● Massive reuse of passwords: a stolen password can open access to several internal services
● Consequences in terms of regulation and compliance: all require robust access controls
● Limited efficiency of chopping: even well protected, a low password remains devant
● Bypassing conventional protections: distributed attacks (botnets, credenial stuffing, etc.) exploit structural weaknesses.
98.5 % passwords analyzed too
Further reading: Grated buttock, bloody elbow, Louis barred the “warrior” – Google formalizes the fusion between Chrome … – There are still a few days left to take advantage of the sales up to 50% of this darling business – Cyberpunk 2077 finally arrives on Mac – Intel Nova Lake-S: the future CPU Customer Tape-Out at TSMC in N2.