Credential Chaos: 2025 Password Trends Reveal Enduring Security Gaps
In the past year, a wave of large-scale breaches—including the high-profile Snowflake incident—has placed billions of credentials into the hands of cybercriminals. In response, the Cybernews research team conducted a comprehensive analysis of newly leaked passwords to evaluate current password creation behaviors and identify emerging trends for 2025.
The State of Password Hygiene: A Persistent Crisis
According to information security researcher Neringa Macijauskaitė, the findings are stark: only 6% of passwords examined were unique. “We’re facing a widespread epidemic of weak password reuse,” she said. “For many users, security hinges solely on two-factor authentication—if it’s enabled at all.”
Despite ongoing user education efforts, password hygiene remains critically poor, underscoring the urgency of transitioning to more secure authentication methods.
Methodology Overview
The research team analyzed exposed credentials from public breaches and data leaks occurring between April 2024 and April 2025. The dataset spanned approximately 213 GB and included more than 19 billion passwords originating from over 200 cybersecurity incidents. Notably, these credentials were anonymized, and Cybernews retained no copies post-analysis.
Analysis techniques included OSINT, CTI, and technical automation. Researchers developed custom bash and Python scripts and leveraged open-source tools to parse password structure, length, character composition, and semantic components.
Credential Stuffing: A Readily Available Attack Surface
Common password patterns revealed a dismal picture. The sequence “1234” appeared in nearly 4% of all passwords, while “123456” was used 338 million times. The term “password” alone appeared 56 million times, with “admin” close behind at 53 million.
These findings highlight the prevalence of default credentials—many of which originate from factory settings in consumer-grade hardware—and their continued use without modification.
What Are People Thinking? Common Themes in Password Construction
The researchers categorized passwords based on recurring themes. Personal names were the second most common component, with “Ana” present in nearly 179 million passwords—often appearing within other words like “banana.”
Uplifting and emotional terms were widespread. “Love” (87M), “sun” (34M), “dream” (6.1M), and “freedom” (2M) made the list, alongside cultural references like “Mario” (9.6M), “Batman” (3.9M), and “Elsa” (2.9M). Swear words were also surprisingly common, with “ass” appearing in 165 million passwords (partially due to overlaps with terms like “pass”).
Geographic terms, brand names, and professions also featured prominently: “Rome” (13M), “Google” (25.9M), “boss” (10M), and “hunter” (6.6M) among them. Notably, 24 million passwords included “god” while 20 million used “hell.”
Key Takeaways
Most people use 8–10 character passwords (42%), with eight being the most popular.
Almost a third (27%) of the passwords analyzed consist of only lowercase letters and digits.
Passwords composed of profane or offensive words might seem rare, but they’re actually very common in practice.
Despite years of being called out, default and “lazy” passwords like “password”, “admin”, and “123456” are still a common pattern.
Password Structure: Short, Simple, and Insecure
Approximately 42% of passwords were between 8 and 10 characters, with 8-character passwords being the most popular. A third of all passwords were composed solely of lowercase letters and digits—a format highly susceptible to brute-force and dictionary attacks. Nearly 20% incorporated mixed-case letters and digits but lacked special characters.
However, there are signs of gradual improvement. “In 2022, only 1% of passwords used a mix of lowercase, uppercase, numbers, and symbols,” Macijauskaitė said. “That figure has now climbed to 19%, reflecting both tighter platform requirements and marginal gains in user behavior.”
A Blueprint for Attackers
By breaking down passwords into core components, researchers mirrored the methods used by attackers during credential-stuffing campaigns. Reuse and predictability remain major threats, as attackers capitalize on fresh leaks from infostealers and cracked hashes to launch large-scale, automated attacks across platforms.
“Even with low success rates—ranging from 0.2% to 2.0%—credential stuffing remains highly profitable,” Macijauskaitė warned. “These attacks can compromise thousands of accounts in a matter of hours.”
Weak passwords were responsible for 30% of ransomware infections in 2019, and the threat persists. Attackers often require no further vulnerabilities to escalate privileges or deploy malware once access is gained.
Mitigating the Risks: Recommendations for Users and Organizations
To strengthen defenses, the I recommend the following:
• Use a password manager to generate and store unique credentials for each service.
• Never reuse passwords. Aim for at least 12 characters with a mix of uppercase, lowercase, numbers, and symbols.
• Enable multi-factor authentication (MFA) wherever available.
• Organizations should enforce strong password policies, ideally requiring 16-character passwords with diverse character sets.
• Deploy secure hashing algorithms and conduct periodic reviews of access control and data handling protocols.
• Monitor for credential leaks and implement automated response mechanisms to limit exposure.
The broader objective of the study is to shed light on user behavior and provide actionable insights that enhance credential security. As attackers evolve their tactics, so too must the strategies used to protect users and systems.