Specops Software Weak Password Report 2022 2
Specops Software Weak Password Report 2022 2
Specops Software Weak Password Report 2022 2
Passwords are easy to attack because people use easy- Understanding common password patterns and user
to-guess passwords. These passwords are guessable behaviors is the first step in securing passwords and the
because people reuse passwords and follow common critical business data they protect.
patterns and themes. These passwords then end up on
breached lists and can be attacked via brute force and
password spraying.
ABOUT SPECOPS Specops Software, an Outpost24 Group company, is the leading provider of
password management and authentication solutions. Specops protects your business data by
blocking weak passwords and securing user authentication. Every day thousands of organizations
use Specops Software to protect business data. For more information, please visit specopssoft.com
Executive Summary
Password attacks are on the rise because passwords themselves are very vulnerable to attack. What specifically
makes them vulnerable? This year’s Weak Password Report takes a look at both the human side and the tech side of
why passwords are the weakest link in an organization’s network.
From real world attack data to passwords inspired by pop culture, the 2022 Weak Password Report has insights into
just how vulnerable passwords truly are.
Some highlights:
• 93% of the passwords used in brute force attacks include 8 or more characters
• 54% of organizations do not have a tool to manage work passwords
• The Cincinnati Reds top the list of most popular baseball teams found in compromised password lists
• 48% of organizations do not have user verification in place for calls to the IT service desk
• 41% of passwords used in real attacks are 12 characters or longer
• 42% of seasonal passwords contained the word “summer”
• 68% of passwords used in real attacks include at least two character types
The research in this report has been compiled through proprietary surveys and data analysis of 800 million breached
passwords, a subset of the more than 2 billion breached passwords within Specops Breached Password Protection
list. The data analysis looked at any password containing words within a particular theme. While it is impossible to
say that using the word “angels” in a password is related to the baseball team in Los Angeles, the prevalence of
words related to the themes demonstrates the problems of password reuse and compromised passwords.
The data in this report should bring awareness to this all-too common problem. The next step is to take action,
which means blocking weak and compromised passwords, enforcing password length requirements, enforcing user
verification at the service desk and auditing the enterprise environment to highlight password-related
vulnerabilities. For this reason, Specops Password Auditor was developed to help organizations identify multiple
vulnerabilities, exportable in report format all in a matter of minutes.
specopssoft.com 1
The weakest link: Passwords
Passwords are easy to attack because people often use vulnerable passwords that are easily guessed or already
compromised. In the Online Security Survey, Google reported that 65 percent of people reuse their passwords.
These passwords are vulnerable because people reuse them across various personal and professional platforms.
This makes it more likely that they end up on breached lists which are then used repeatedly in password attacks.
Historically, the best practice for creating stronger passwords was to require minimum character length and added
complexity, in the form of different character types. This advice has proven to create passwords that are difficult for
people to remember, and easy for hackers to exploit. As long as people reuse passwords, making these more secure
comes down to disallowing all known compromised passwords.
Reusing passwords is the understandable result of having too many passwords to manage in our digital lives. Many
people reuse a password once they have created something that passes the complexity test of a password strength
meter. In general, people follow similar patterns when creating memorable passwords by choosing root words that
are family-oriented or related to their interests. Complexity is added to these root words in predictable patterns,
such as placing numbers at the end of the password, leetspeak character substitution and keyboard patterns.
specopssoft.com 2
What about requiring special characters or complexity? Standards like PCI or HITRUST require different character
types as part of your organization’s password rules. Attackers seem to be taking these standards into account as
well as our research team found that 68 percent of
passwords used in real attacks include at least two
Attacks with 12 characters
character types.
The next sections will provide a break down of how weak and compromised passwords can give a hacker a golden
ticket to your data and IP. Understanding what a wordlist is and realizing that the service desk could be the biggest
piece of the puzzle increasing your attack risk, are important steps in assessing all potential password related
vulnerabilities.
specopssoft.com 3
SMB Protocol Attacks
Weak passwords are an easy entry point for attacks almost anywhere in your network but recent events have put
attention on the SMB protocol. Purple Fox, malware that was first discovered in 2018, has seen a recent rise in
proliferation as hackers take advantage of a new attack method: weak passwords used over the SMB protocol.
SMB (Server Message Block) is a protocol mainly used by Windows computers to communicate with other network
devices like printers and file servers. Active Directory users on Windows computers utilize the SMB protocol with
their Active Directory password.
The intent of this dataset was to be used to assist in the brute-force attacks on password
hashes with the goal of finding a password in the wordlist to log into the service or system that
the hash protects. This dataset was described as a combination of “COMB” (Collection of Many Breaches), and
wordlists generated from Wikipedia, and other sources.
specopssoft.com 4
The dataset trends towards longer
passwords, necessitating the enforcement of either
harder-to-remember longer passwords, to avoid
collisions with the wordlist, or optimally, the use of
passphrases.
specopssoft.com 5
The above breakdown indicates that adding most of RockYou2021 to a breached password protection list is not
required, as sufficient complexity rules could protect against over 95 percent of the records. By simply requiring
upper, lower, numbers, and special characters, one would rule out a valid password being contained in the following
categories (comprising of 96.5 percent of our sample).
At the end of the day, RockYou2021 was not a large dump of breached passwords (though it did contain some).
However, it is still a wordlist which attackers may choose to use in their attacks against your network. Other notable
breached password lists that could be used against your network:
specopssoft.com 6
calls. The information was uncovered as part of our survey of more than 200 IT leaders from the private and public
sectors in North America and Europe.
In addition, the survey revealed that 28 percent of the companies that do have a user verification policy in place are
not satisfied with their current policy due to security and usability issues. For example, most of these
companies rely on knowledge-based questions using static Active Directory information, such as an employee ID, a
manager’s name, or even HR-based information like the employee’s date of birth or address – data that can easily
be sourced by hackers. In fact, the NIST recommends against using knowledge-based questions because of their lack
of security.
To understand how wide-spread the risk is, look no further than the 2021 EA Games breach. A group of hackers,
who were able to gain access to internal systems and steal data from game publisher Electronic Arts (EA Games) in
part, by tricking an employee over Slack to provide a login token. A representative for the hackers told Motherboard
in an online chat that the process started by purchasing stolen cookies being sold online for $10 and using those to
gain access to a Slack channel used by EA, according to Vice. Since EA Games didn’t have an enforced end-user
verification software in place the hackers were successful in tricking the service desk.
Once they gained access, the hackers stole the source code for FIFA 21 and related matchmaking tools, as well as
the source code for the Frostbite engine that powers games like Battlefield and other internal game development
tools. In all, the hackers claim they have 780GB of data, and are advertising it for sale on various underground
forums. While most hackers are motivated by the profits of their exploits, the ramifications for an organization like
EA could be devastating.
specopssoft.com 7
Compromised passwords: themes and patterns
While just about any password can be compromised and used in attacks on businesses, highlighting those that are
more popular demonstrates the difficulty most people have coming up with a password that is not easy to guess.
Many people reuse a password once they have chosen one that meets most complexity requirements, rather than
memorizing multiple complex passwords. As it’s common for people to choose root words based on their interests,
Specops Software analyzed large data sets of compromised passwords in order to find recurring themes.
The results show that people turn to seasons, musicians, sports teams, movies, and TV shows when choosing
passwords. Since this analysis was undertaken on known compromised passwords, these pop culture passwords are
already being used by hackers in real-world attacks.
Best-selling artists
In honor of the 2021 Grammy awards,
the Specops Software research team
analyzed over 800 million passwords for
any entry containing the artist or group
name on Wikipedia’s best-selling list.
specopssoft.com 8
While Rihanna holds the top spot on
Wikipedia’s best-selling list, Beyoncé
fans have a slight edge in honoring their
favorite in their password but it’s a
virtual tie.
Baseball teams
The Cincinnati Reds, America’s oldest
baseball team, tops the list of
baseball teams in an analysis of
Specops’ breached password list.
specopssoft.com 9
Premier League clubs
Chelsea, one of England’s most
successful football clubs, rank in first
place on Specops’ breached password
list.
College Football
The Specops Software research team
looked at passwords related to top
football playing schools and found that
Georgia Tech or (GT), the University of
Kansas or (KU) and the University of
Florida or (UF) each appear more than 5
million times on breached password
lists.
University of Central Florida or (UCF), University of Texas – El Paso or (UTEP) and the University of California Los
Angeles (UCLA) appear the least.
Top Movies
Fan favorite ‘Rocky’ took the #1 spot,
showing up on breached password lists
nearly 96,000 times, according to the
research. Trailing close behind was
‘Hook’, which showed up in over 75,000
breached password lists and the ‘Matrix’
at more than 50,000.
specopssoft.com 10
Star Wars
According to the research, Yoda took the
#1 spot, showing up on breached
password lists nearly 37,000 times. After
that, “starwars” itself took the number
two spot, showing up over 22,000 times
with the adorable “ewok” trailing close
behind at over 17,000 times.
Marvel vs. DC
According to our research, ‘Loki’ (Marvel)
took the top spot, appearing on breached
password lists more than 151,000 times.
‘Thor’ (Marvel), which appears almost
148,000 times and ‘Robin’ (DC), which
shows up over 127,000 times to round
out the top three.
specopssoft.com 11
Bottom line: Address the Problem
Passwords are easy to attack because people often use vulnerable passwords that are easily guessed or already
compromised. These passwords are vulnerable because people reuse them across various personal and professional
platforms, and because they follow typical patterns and themes at the point of creation. This makes it more likely
that they end up on breached lists which are then used repeatedly in password attacks.
Making passwords complex creates passwords that are difficult for people to remember, and easy for hackers to
exploit. As long as people reuse passwords, making these more secure comes down to disallowing all known
compromised passwords.
This is why it is so important to understand where your organization’s password usage and policies could be leaving
you vulnerable to an attack. Let 2022 be the year that your organization addresses the problem of password reuse
before suffering the consequences of a cyber-attack.
specopssoft.com 12