If you’ve ever reused a password across accounts, you’re statistically the norm—a new study confirms that 94% of exposed passwords are weak or duplicated. Researchers at Cybernews analyzed 19 billion credentials exposed through over 200 breaches since April 2024, and what they found paints a grim picture for anyone still relying on familiar, easy-to-type passwords. Just 6% of the leaked passwords were unique, meaning the vast majority were vulnerable to the credential-stuffing attacks that fuel so many breaches today.

Total compromised passwords: 19 billion · Reused or weak passwords: 94% · Unique passwords: 6% · Data collection period: April 2024 – April 2025 · Common pattern example: 123456

Quick snapshot

1Confirmed facts
  • 19,030,305,929 passwords analyzed (Cybernews)
  • Only 6% unique (1,143,815,266) (Cybernews)
  • 123456 dominates the worst passwords list (Cybernews)
2What’s unclear
  • Exact number of individual victims
  • Full scope of exploitation to date
  • How many credentials actively traded
3Timeline signal
  • April 2024 onward: 200+ breaches aggregated
  • June 2025: 16B infostealer leak reported
  • July 2025: SharePoint zero-day hit 400+ orgs
4What’s next
  • Credential-stuffing attacks likely to rise
  • Pressure on MFA adoption mounting
  • Password manager adoption accelerating

Four data points, one pattern: most people still choose passwords that attackers can guess in seconds.

Researchers documented how password creators consistently fall into predictable traps across the 19 billion dataset.

Field Value
Leak size 19 billion passwords
Timeframe April 2024 – April 2025
Weak passwords 94%
Unique ones 6%

What are the top 10 worst passwords?

The Cybernews study identified clear patterns in the 19 billion leaked credentials. Simple numeric sequences dominate the list, with 123456 appearing far more often than any other password. Researchers found that names like “Ana” rank as the second most popular password component, suggesting many users default to personal references they can easily recall.

  • 123456 – the most common by a wide margin
  • password – 56 million occurrences recorded
  • admin – 53 million occurrences
  • 123456789
  • 12345678
  • 1234
  • 1234567
  • qwerty
  • abc123
  • letmein

Default credentials like “admin” and “root” remain widespread, especially on routers and IoT devices that users never bother to change after setup.

Why this matters

Weak passwords give attackers an unfair advantage: automated tools test millions of combinations in seconds, so defenders must raise the cost of guessing past the point where simple attacks remain profitable.

The implication: no sophisticated hacking required—when your password is “123456,” you’re relying on attackers being too lazy to try the obvious.

Common patterns in the 19 billion leak

Sequential numbers and keyboard patterns (qwerty, qwerty123) account for a significant share of the dataset. The analyzed dataset contained 213 GB of data from original leaks over 3 TB of total information processed. Names, birth years, and sports teams frequently appeared as password foundations, making social engineering attacks particularly effective against these choices.

Why these passwords fail

Short passwords with predictable patterns fall quickly to brute-force attacks. Dictionary attacks exploit the fact that humans consistently choose from a limited vocabulary of words rather than random character combinations. The 94% reuse rate means that a single breach potentially compromises every account where that password appeared.

The catch

The math is brutal: four out of five global data breaches occur due to weak or stolen passwords, meaning if you reuse a password and one service gets breached, every account using that credential is exposed.

Bottom line: What this means: the weakest link isn’t the password itself—it’s our collective refusal to treat each account like it matters.

Where can I see if my passwords are compromised?

Several free tools let you check whether your credentials have surfaced in known breaches. These databases aggregate information from various leaks and allow searches by email address or username.

Cybernews password leak checker

The Cybernews password leak checker allows users to verify whether their data appeared in the 19 billion credential dataset. The tool cross-references submitted emails against known breach compilations and provides instant feedback on exposure status.

Google Account tools

Google’s Password Manager includes a breach alert feature that notifies users when their saved credentials appear in known data leaks. The service monitors across all stored passwords and flags compromised accounts automatically. Users with Google accounts can access this feature through their account security settings.

Have I Been Pwned, operated by security researcher Troy Hunt, remains one of the most comprehensive breach databases available. The service allows email-based searches and provides details about which specific breaches exposed a given account.

The upshot

Checking is free and takes under a minute. If you find your email in a breach database, assume your password is compromised and change it immediately on any account using that credential.

The pattern: breach databases are only as good as the information they contain. New breaches populate these tools over time, so periodic checks matter.

What to do about compromised passwords?

If your credentials appear in a breach database, acting quickly limits the damage. The window between a leak becoming public and attackers weaponizing the data can be surprisingly short.

Immediate steps to secure accounts

Change passwords immediately for any affected accounts, starting with the most critical: banking, email, and social media. Enable two-factor authentication (2FA) wherever possible, prioritizing authentication apps over SMS-based codes where the service allows it. Review recent account activity for unfamiliar logins or changes.

  • Change passwords on all accounts using compromised credentials
  • Enable two-factor authentication on every service that supports it
  • Review connected apps and revoke access for unused integrations
  • Monitor financial statements for unauthorized activity

Password manager recommendations

Password managers generate and store unique, complex passwords for every account, eliminating the reuse problem at its root. Leading options include Bitwarden (open-source, free tier available), 1Password, and Dashlane. Most browsers now include basic password management, though dedicated managers offer cross-platform sync and enhanced security features.

The average person manages dozens of online accounts—a password manager makes unique credentials practical without requiring memorization of each one.

What to watch

The 16 billion infostealer credentials exposed in June 2025 include cookies and tokens, not just passwords. Even strong, unique passwords may not protect accounts if attackers gain session cookies through stealer malware.

The implication: password hygiene is necessary but insufficient. Without 2FA, even unique passwords remain vulnerable to real-time credential-capturing attacks.

How did all my passwords get compromised?

No single breach accounts for 19 billion credentials. Instead, the figure aggregates results from approximately 200 separate incidents that became publicly available between April 2024 and April 2025. Each breach contributes a slice—some massive, some modest—to the total.

Data breaches from 2024-2025

Major incidents fueling the credential compilation include the Snowflake breaches affecting numerous enterprise clients, the SOCRadar.io leak exposing Microsoft-related data, and the National Public Data breach from March 2024 that alone exposed 2.9 billion records. The Chinese Surveillance Network breach in June 2025 added 4 billion records including WeChat accounts and banking details.

The separate 16 billion credentials leak, reported around June 21, 2025, stemmed from infostealer malware campaigns that captured credentials directly from infected devices. This dataset included logins for Google, Apple, and Facebook accounts, compiled from 30 separate datasets with a largest single collection exceeding 3.5 billion records.

Reuse across sites

Password reuse amplifies breach impact dramatically. When one service suffers a breach, attackers test stolen credentials against hundreds of other platforms—a technique called credential stuffing. Users who reuse passwords across multiple services effectively give attackers master keys to their entire digital lives.

Researchers noted that password reuse creates a domino effect, increasing cyberattack risks even without direct compromise of a specific account. The 94% reuse rate in the studied dataset confirms that this vulnerability affects the vast majority of users.

The trade-off

Managing unique passwords for every account is inconvenient—but the inconvenience of account takeover is considerably worse. Password managers eliminate the friction while providing the security of unique credentials.

What this means: your password doesn’t need to be strong against direct attack if it’s unique to each service. A breach of one account stays contained rather than spreading.

What is an unhackable password?

No password is truly unhackable. A determined attacker with sufficient resources can eventually crack any password through brute force or sophisticated guessing. However, practical security isn’t about being unbreakable—it’s about making the cost of attack exceed the value of the prize.

3-word password rule

Security experts increasingly recommend passphrase-based passwords using three or more random words. A phrase like “correct horse battery staple” offers approximately 25-30 characters of length, making it resistant to brute-force attacks while remaining memorable. The randomness matters—predictable phrases like “blue sky happy” don’t provide the same security benefits.

The three-word approach balances security and usability: long enough to defeat automated attacks, simple enough that most people can remember it without writing it down.

Strong password examples

Effective passwords share common characteristics: length of 16+ characters, mixed character types, avoidance of dictionary words in sequence, and uniqueness to each service. Examples of strong patterns include random character strings (generated by password managers) and multi-word passphrases with deliberate substitution and capitalization.

The Cybernews study found that only 6% of passwords in the 19 billion dataset were unique—meaning 94% of users rely on patterns that appear elsewhere in the compilation. Truly random or passphrase-based passwords represent a small minority.

The upshot

The safest password is one you’ve never used before, will never use again, and cannot guess from your personal history. A password manager generating random 20-character strings comes closest to this ideal.

For most people, the practical choice is clear: use a password manager with randomly generated credentials, or accept that your accounts are only as secure as the weakest password you’ve reused.

How to check and secure your accounts: step by step

The following steps provide a practical workflow for verifying your exposure and improving your security posture.

  1. Step 1: Visit Have I Been Pwned and enter your email addresses. Note any breaches listed.
  2. Step 2: Check your saved passwords using the Cybernews checker or Google’s password alerts.
  3. Step 3: For each exposed password, identify every account using that credential.
  4. Step 4: Change passwords for all affected accounts, prioritizing banking, email, and social media.
  5. Step 5: Enable two-factor authentication on every service that supports it.
  6. Step 6: Install a password manager and generate unique passwords for all accounts.
  7. Step 7: Review connected devices and sessions in account settings, removing unfamiliar entries.
Bottom line: Password reuse exposes most users to account takeover across multiple services. Users who adopt a password manager with unique, randomly generated credentials for each account and enable two-factor authentication meaningfully reduce their exposure to both breach-driven credential theft and targeted attacks.

Key events in the credential breach timeline

Several major incidents shaped the credential landscape between 2024 and 2025.

Date Event
March 2024 National Public Data breach exposes 2.9 billion records
April 2024 onward Over 200 breaches begin exposing passwords for Cybernews study
January 2025 Breach activity peaks with over 2 million accounts affected
January 24, 2025 Healthcare breach affects up to 190 million people
June 2025 Second peak with over 2 million breached accounts
June 2025 Chinese Surveillance Network breach exposes 4 billion records
June 21, 2025 16 billion infostealer credentials reported
June 2025 Microsoft SharePoint zero-day compromises 400+ organizations

The pattern: breaches are accelerating in frequency, and the credential compilation available to attackers grows larger with each incident. January and March 2025 saw particular peaks in breach activity, each exceeding 2 million compromised accounts.

Confirmed facts

  • 19,030,305,929 passwords analyzed
  • 94% reused or weak (6% unique)
  • 123456 most common password
  • 16 billion credentials exposed by infostealers
  • 81% of breaches involve compromised credentials

What’s unclear

  • Exact individual victim count
  • Current exploitation extent
  • How many credentials actively traded
  • Full list of H1 2025 affected countries

“We’re facing a widespread epidemic of weak password reuse. Only 6% of passwords are unique, leaving other users highly vulnerable to dictionary attacks.”

Neringa Macijauskaitė, information security researcher at Cybernews (Cybernews password study)

“The ‘default password’ problem remains one of the most persistent and dangerous patterns in leaked credential datasets.”

Neringa Macijauskaitė, information security researcher at Cybernews (Cybernews password study)

“This is not just a leak – it’s a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials.”

Cybernews researchers (Cybernews infostealer analysis)

For anyone still reusing passwords across accounts, the choice is stark: adopt a password manager with unique credentials and enable two-factor authentication, or accept that your digital identity depends on the security of the weakest service you’ve ever used. The data from 19 billion leaked passwords makes one thing clear—choosing convenience over security has consequences that extend far beyond a single compromised account.

Related reading: Password leak study unveils 2025 trends: reused and lazy · Billions of credentials exposed in infostealers data leak

This unprecedented dataset echoes the 19 billion leaked passwords analysis cybersecurity experts flagged recently, stressing the urgency of auditing personal credentials amid rising breach threats.

Frequently asked questions

What is the most common hacked password?

123456 is the most commonly used password found in breach datasets and the most frequently cracked in credential-stuffing attacks. Security researchers consistently find it at the top of lists compiled from leaked credentials.

Which is the safest password in the world?

No single password is the “safest”—security depends on uniqueness, length, and randomness rather than the specific characters chosen. A randomly generated 20-character password from a password manager comes closest to the ideal of being both secure and uncompromised.

What is the 3 word password rule?

The 3-word rule recommends using passphrases of at least three random, unrelated words as passwords. Examples like “correct horse battery staple” provide length and complexity while remaining memorable. The randomness of word choice matters more than length alone.

What are the two possible signs that you have been hacked?

Common indicators include unexpected password changes preventing login and unfamiliar account activity like sent messages or purchases you didn’t authorize. Receiving security alerts from services about logins from unknown locations or devices also suggests compromise.

How secure is a three word password?

A three-word passphrase like “correct horse battery staple” offers strong protection against brute-force attacks due to its length (approximately 25-30 characters). However, it remains vulnerable to dictionary and social engineering attacks if the words relate to the user’s interests or life events.

What are common signs of a hack?

Beyond password issues and unauthorized activity, signs include being locked out of accounts despite correct credentials, unexpected software installations, slow device performance, and unknown browser extensions or toolbars. Emails in sent folders that you didn’t send also indicate compromise.