Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security IT

Analysis of 32 Million Breached Passwords 499

An anonymous reader writes "Imperva released a study analyzing 32 million passwords exposed in the Rockyou.com breach. The data provides a unique glimpse into the way that users select passwords and an opportunity to evaluate the true strength of these as a security mechanism. In the past, password studies have focused mostly on surveys. Never before has there been such a high volume of real-world passwords to examine." Most interesting to me was that in the sample, less than 4% used any non alpha-numerics in their #$#%'ing passwords.
This discussion has been archived. No new comments can be posted.

Analysis of 32 Million Breached Passwords

Comments Filter:
  • by Anonymous Coward on Thursday January 21, 2010 @08:46AM (#30845068)

    My company wants me to change my pass every 2 months. Guess what happens to the password strength over time.

    • by Rockoon ( 1252108 ) on Thursday January 21, 2010 @08:54AM (#30845136)
      My company (over 10,000 employees, not in the computer industry) does the same thing, but the really annoying part..

      ..it must be EXACTLY 2 letters, followed by EXACTLY 4 digits.

      So even allowing for upper case (which I am not sure that it differentiates), the total password space is only 2704000000.

      The size of this space can conveniently fit into a 32-bit value, which is probably what they are doing: storing passwords in an integer field.

      Did I mention that they pay our IT department $11/hour?

      Yeah, all my coworkers do the same thing: use the same 2 letters every time they need to change it, followed by "1111" then "2222" then "3333" and so forth...
      • Did I mention that they pay our IT department $11/hour?

        Yeah, all my coworkers do the same thing: use the same 2 letters every time they need to change it, followed by "1111" then "2222" then "3333" and so forth...

        Shit, I thought I had it bad with pay.

        We moved to a required 8 digits and 3 of the 4: Upper case, lower case, symbol, number. Resets every 30 days. What has happened with me? My strong 20 digit password has been trimmed down to the bare minimum because I will have to change it in 30 days anyway. Completely defeats the purpose.

      • by Anonymous Coward on Thursday January 21, 2010 @09:35AM (#30845590)

        .., followed by "1111" then "2222" then "3333" and so forth...

        Dont you mean so 4444th.

      • Re: (Score:3, Insightful)

        by nine-times ( 778537 )

        ..it must be EXACTLY 2 letters, followed by EXACTLY 4 digits.

        That's retarded.

        I've thought about this sort of thing before, where password policies also have the effect of narrowing the number of possible passwords. For example, it's pretty standard for a company to have a policy like, "Your password must be at least 10 characters, contain at least one capital letter and one lower case letter, contain at least 1 number and one non-alpha-numeric character." And yes, it's true that keeping these policies has the effect of increasing the number of combinations, but i

        • by clodney ( 778910 ) on Thursday January 21, 2010 @10:19AM (#30846190)

          It may narrow the nominal keyspace, but it almost certainly increases the average keyspace that needs to be searched. Without the complexity requirements most people will use a dictionary word or something like that. And the company wants to keep all the accounts secure, so it has to care about the average password.

          And think of it this way - in a keyspace that requires 10 numeric digits, what percentage of the total keyspace is consumed by anything containing less than 10 digits? seems to me you have only given up 10% of the space, and an even smaller percentage if you consider the full printable range of characters instead of just numerics.

        • Re: (Score:3, Interesting)

          by kalirion ( 728907 )

          Given the above policy, a smart hacker would bruteforce the following template:

          (1 capital letter)(7 lower case letters)(1 number)(1 special character). With a dictionary attack for the first 8 characters.

          Password1!

    • by suso ( 153703 ) * on Thursday January 21, 2010 @09:11AM (#30845288) Journal

      I dealt with a bank once that expected its customers to change its passwords every 2 weeks. So obviously what happened is every time a customer needed to check their bank account, probably once a month, they were locked out. Now this isn't necessarily the problem here. The problem is that with people having to call in every time to reset their password, it becomes such a norm that it probably drastically increases the potential for social engineering.

    • by WuphonsReach ( 684551 ) on Thursday January 21, 2010 @09:18AM (#30845394)
      My company wants me to change my pass every 2 months. Guess what happens to the password strength over time.

      It's a leftover idea from a bygone decade.

      The primary advantage of a required monthly or bi-monthly change is that if a password is compromised, it's only useful for about 1/2 of the expiration period. So it's a way of reducing risk in the case of accidental or nefarious disclosure.

      But the big downside is that it requires users to be constantly learning new passwords every month or so. And unless these passwords are automatically assigned, users WILL pick weaker and weaker passwords over time or passwords that fit into an easily remembered sequence. So you really end up back where you started.

      Forced password renewal is a valid strategy in a small number of cases. Such as a system which protects billions of dollars in assets or is super super critical to the business. But in those cases, there should be 2-factor authentication in play anyway and the passwords probably only need to be changed every 3-6 months and should be randomly assigned.

      For end users? Limit their permissions, force complex passwords, but don't require them to change frequently (*maybe* once every 2 years). Tell them to go ahead and write the passwords down and store them in their wallet next to their credit cards. Which is at least a huge step up from putting it under the keyboard or stuck to the monitor.

      Longer passwords are also easier to remember if they are used frequently (at least daily). But for some users, it may take as long as 2-3 weeks for them to remember it without looking.
    • That’s why I chose “visual pattern” passwords. I draw symbols on the keyboard, e.g. while holding Mod3. (NEO layout [neo-layout.org]. Hover the mouse above “Ebene 3”.)
      Like a N. Which results in “#\.../|{[” or “#u...1_a~e]4” (where ... is one character […], that Slashdot does not accept.)

      (This is an example. The real type of pattern I use is something different. ;)

    • by zx75 ( 304335 )

      I need to change my company password every month, but the password strength for my company account remains strong.

      My password strength for a website forum where I never need to change it however, is usually weak.

      The password strength I use is highly correlated with the sensitivity of the information it allows access to and the importance of the systems.

      I would fall into the 96% of people who don't use non-alphanumerics for "Rockyou.com"

  • I think it would be interesting to search the passwords I use against the list. I like to think that my passwords are pretty good, but it would be interesting to see how similar they are to the passwords that were obtained and used in the study.
  • The Top 10 (Score:5, Informative)

    by goldaryn ( 834427 ) on Thursday January 21, 2010 @08:48AM (#30845078) Homepage

    1. 123456
    2. 12345
    3. 123456789
    4. Password
    5. iloveyou
    6. princess
    7. rockyou
    8. 1234567
    9. 12345678
    10. abc123

    By a massive coincidence, these happen to be the passwords for their respective /. userids!

    • Re: (Score:3, Insightful)

      by Anonymous Coward

      Is there a reason to have a really strong password on "rockyou.com"?

      Maybe since it integrates with facebook and the like?

      I'm really annoyed when all I want to do listen to some online music (ie pandora, etc) and the web site gets pissy because I choose pandora as my password.

      Why should I care?

    • Whatever happened to love, secret, sex, and God?
    • Dear mods: funny? No, this is fact--read the article. (I was surprised too.)

    • by Pollux ( 102520 ) <speter@[ ]ata.net.eg ['ted' in gap]> on Thursday January 21, 2010 @09:20AM (#30845404) Journal

      Roland: One.
      Dark Helmet: One.
      Colonel Sandurz: One.
      Roland: Two.
      Dark Helmet: Two.
      Colonel Sandurz: Two.
      Roland: Three.
      Dark Helmet: Three.
      Colonel Sandurz: Three.
      Roland: Four.
      Dark Helmet: Four.
      Colonel Sandurz: Four.
      Roland: Five.
      Dark Helmet: Five.
      Colonel Sandurz: Five.
      Dark Helmet: So the combination is... one, two, three, four, five? That's the stupidest combination I've ever heard in my life! The kind of thing an idiot would have on his luggage!

      -----

      President Skroob: What's the combination?
      Colonel Sandurz: 1 - 2 - 3 - 4 - 5.
      President Skroob: 1 - 2 - 3 - 4 - 5?
      Colonel Sandurz: Yes.
      President Skroob: That's amazing! I've got the same combination on my luggage!

    • Really? "Password" as password? I'm so disappointed.

  • by geekmux ( 1040042 ) on Thursday January 21, 2010 @08:49AM (#30845094)

    ...Most interesting to me was that in the sample, less than 4% used any non alpha-numerics in their #$#%'ing passwords.

    Er, does it REALLY matter anymore the strength of your password with the FBI using post-it notes as a search warrant? I mean I hate to say that, but seriously.

    On a related note, what pisses me off even more is going to a website and trying to use a strong password and their system doesn't allow it.

    • by AndersOSU ( 873247 ) on Thursday January 21, 2010 @08:58AM (#30845170)

      Well it doesn't matter (and it never did) if you're selecting passwords so the FBI can't read your secret diary.

      If, on the other hand, you're concerned about someone in Russia gaining access to your credit card it still matters.

      • Re: (Score:3, Funny)

        by marcobat ( 1178909 )
        Someone in Russia can just hack into a fbi account using some IE or PDF hole, then send a false subpoena to gain access to my account. The subpoena will never be looked on twice or reviewed by anyone and my provider will promptly comply. There is no escape :-)
    • Re: (Score:2, Insightful)

      by Omegium ( 576650 )
      Do you really think that the FBI is your greatest enemy online?
      IT IS NOT.
      It is nice to think that you are enemy of the state nr 1 and that everybody cares about your secrets, but that's not the case. You should worry about phishers and other criminals, not about law enforcement. And they don't use search warrants. They need to crack passwords
    • On a related note, what pisses me off even more is going to a website and trying to use a strong password and their system doesn't allow it.

      Tell me about it. I got a good idea from a slashdot comment about a way to easily have secure, diverse passwords for my websites: use a password generator to make a grid of passwords, and devise a mapping from the website name onto the grid. Print the grid on a business-card size sheet. Put a photocopy in your wallet, and the original somewhere you will absolutely no

    • On a related note, what pisses me off even more is going to a website and trying to use a strong password and their system doesn't allow it.

      I'm afraid of using a good password at some sites because I fear they store passwords in cleartext. No point in wasting a good password on that!

    • Whats even worse is when that website is your bank.
    • by Kozz ( 7764 )

      I have to change my password at work every 90 days. The result is that I'm creating passwords that don't have non-alphanumerics, but are usually phrases of two or more words together, like "anappleaday" or "lookatmenow" or "changingpwsucks". Am I more or less secure than people forced to use non-alphanumerics who create passwords like "judy1" or "maroon5"? I think so...

    • Or, what should also piss you off, is you using a strong password and the web site storing it clear text on a vulnerable SQL server.
    • Well, in a properly designed system all private data is encrypted with that password, and only when you enter it, and it is cached in the current session, can that data be decrypted.
      Of course, how many properly designed systems are there out there. I heard in the US, not even banks do this properly. (Except maybe if you consider WoW a bank. ;)

      Protip: Data that is shown to everyone on Facebook, is never encrypted. ;)

  • I can't tell you how frustrating it is to try to keep information secure on various web sites or with companies that still use antiquated password styles. 6-8 chars or numbers only? Really? Still? After all the identity theft you'd think companies would at least step up their need to have users have strong passwords. But nope, places like Earthlink still use limited password capability.

    • by Scutter ( 18425 ) on Thursday January 21, 2010 @08:53AM (#30845130) Journal

      The report makes it painfully obvious that passwords are an ineffective way to secure information because too many people find strong passwords cumbersome. Maybe we need to come up with something better.

      • Every attempt at doing so creates a serious privacy problem, adds an extra level of security problem, or is very complicated that it is difficult to deploy on a large scale.

  • At least in Alaska, ZIP codes seem to be the most popular choice, according to a survey of one known case.
  • by naz404 ( 1282810 ) on Thursday January 21, 2010 @08:52AM (#30845120) Homepage
    Does anyone have the list of passwords itself?

    It would be fun to perform one's own statistical analysis of the list :)
    Here's the top 20 most common passwords used according to the report:
    Rank Password # of Users
    1 123456 290731
    2 12345 79078
    3 123456789 76790
    4 Password 61958
    5 iloveyou 51622
    6 princess 35231
    7 rockyou 22588
    8 1234567 21726
    9 12345678 20553
    10 abc123 17542
    11 Nicole 17168
    12 Daniel 16409
    13 babygirl 16094
    14 monkey 15294
    15 Jessica 15162
    16 Lovely 14950
    17 michael 14898
    18 Ashley 14329
    19 654321 13984
    20 Qwerty 13856
  • Re: (Score:2, Insightful)

    Comment removed based on user account deletion
    • From the source report [imperva.com] (PDF, 387kb), we also read this: "Passwords were stored in cleartext in the database and were extracted through a SQL Injection vulnerability."

      So RockYou was rather security unconcious from the beginning. Cleartext instead of hashed? C'mon.

  • by tunabomber ( 259585 ) on Thursday January 21, 2010 @08:59AM (#30845182) Homepage

    Is it even worth the effort of coming up with a secure password for that site? If I had for some reason found it necessary to register with such a vapid site I would have just re-used one of my low-security passwords (which many other sites have access to). It isn't too surprising that nobody cares whether someone else is using their account to steal their noisy, eye-burning flash videos. What is far worse is if people are re-using passwords from much more important sites. In this case, it doesn't matter if your password is a random string of letters, numbers and special characters.

    • To clarify here, I only reuse passwords for accounts which could not be used for anything too nefarious if they were hacked. My logins for more important sites (like /.) have unique passwords.

    • I have a couple questions for some more security minded folks here on slashdot, about the 'conclusions' of the analysis in the linked article. . .

      * "The shortness and simplicity of passwords means many users select credentials that will make them susceptible to basic forms of cyber attacks known as 'brute force attacks.'"

      Is this really true? Here's why I ask - most websites (though unfortunately not all), seem to lock your account if you don't get the right password in 3-5 attempts. Th

  • by Dun Malg ( 230075 ) on Thursday January 21, 2010 @09:00AM (#30845192) Homepage

    Most interesting to me was that in the sample, less than 4% used any non alpha-numerics in their #$#%'ing passwords.

    Why is it any surprise that people tend to approach passwords as a pass-WORD? It has to be something they can remember, and remembering a string of characters they can't pronounce is far more difficult than remembering (say) their favorite basketball team and the year they graduated high school.

    • Re: (Score:3, Informative)

      by Megane ( 129182 )

      There's no reason something can't be both pronounceable and secure. Start with two nonsense syllables, and add a special character between them. Not quite as "secure" as a completely random password, but much less likely to be written down, plus some of the letters can be l33t3d for variant forms. Make three base words for various levels of usage (one for regular web stuff, one for login passwords, and another rarely used for important stuff), and you can even keep around hints for rarely used passwords wit

  • by jmauro ( 32523 ) on Thursday January 21, 2010 @09:05AM (#30845224)

    Since most sites have a bunch of silly restrictions (no special characters, no more than 8, etc) most systems if the don't enforce strength, randomness, etc will degrade down to the lowest level where the password will work on all the systems.

  • The article says that in 20 years users have not gotten better at creating good passwords.

    Logically then the solution is NOT to get users to take "password security seriously". This is like trying to stop VD by convincing teens to abstain from sex - it's in the never-going-to-happen catagory.

    The solution is to mitigate the damage of a brute force attack - when bots make password guess attempts, you need counter-"bots" to detect patterns of access and then block IPs, warn users, or disable accounts. This is

  • My passwords tend to be words that I make up on the spot, with a couple of numbers thrown into the mix. They don't seem too difficult on the surface...but then again it is a word that I make up, some of which don't even have vowels lol. I have a series of seven different ones that I use.

    It's worked quite well for me over the years :-)

  • Does one really need to worry about "brute force" attacks if it's a system that enforces a lock-out of a user account after a set number of incorrect passwords (say, 5 in 10 minutes or so)?

  • Why surprising? (Score:5, Insightful)

    by argStyopa ( 232550 ) on Thursday January 21, 2010 @09:09AM (#30845278) Journal

    "Most interesting to me was that in the sample, less than 4% used any non alpha-numerics in their #$#%'ing passwords."

    Not surprising at all, because the rules for what you CAN use as passwords are so inconsistent. Some places REQUIRE non alphanumerics, but have a limited choice of what you can use. Some don't accept ANY non alphanumerics, some will accept them but again it's different from site to site.

    I don't know about you, but I've probably got 100 different passwords rattling around in my brain. I'd guess most people are like me in that they see passwords as a necessary evil but otherwise a giant pain in the ass, and so accept the slight increase in security risk by using a system that changes predictably (at least for me) from site to site. So I'm not going to use a base-password or base-concept that includes any characters that might be disallowed on some other site.

    • Re: (Score:3, Interesting)

      Southwest.com allows you to create a password with non alpha-numeric characters, but then you can't log in with your password!
  • One thing that bugs me is the people who think that requiring at least one capital and one non-alphanumeric makes the password a lot stronger. Using lower case alphanumeric gives a range of 36 symbols at each point. Adding the new constraint increases this to around 70, given the limited set of non-alpha likely to be used. It doesn't take a genius to work out that, for instance, an 8-character plain lower case alphanumeric has more possible values than a 6-character mixed password. And I can easily generate
  • 12345? (Score:3, Funny)

    by selven ( 1556643 ) on Thursday January 21, 2010 @09:16AM (#30845350)

    That sounds like a combination that an idiot would put on his luggage.

  • Strength of a chosen password is a function of information it protects. I am sure most users follow this rule even without specifically identifying it.
    In this sense, services like Rockyou are at the very bottom - the only reason users select a password for such a service is because it requires them to. I would bet that if it let users have an optopn of not having a password at all - they would gladly do so.

    While I don't have a sample to prove this, it would be interesting to compare these to passwords selec

  • intelligent password management:

    pick something you will always remember say "frankie45"

    lets say the website you are visiting is facebook.com

    so your password there will be "frankie45face"

    and your password at twitter.com would be "frankie45twit"

    in other words, you want to use what's called an algorithm

    make your ALGORITHM unique, not your password. so maybe your algorithm would be "'twenty23' plus the second through fifth letters in the website's name plus my daughter's birthday" or whatever

    the point is: having one password across all websites is a vulnerability, and having simple passwords is a vulnerability. so instead, don't remember a password, remember an ALGORITHM that you can use to recreate your password for any site on the fly

    by the way, i got this idea from a slashdot thread, and it was an eureka moment for me, and i went about resetting all my passwords

    i forget the thread or the user id of whoever made the comment, but it was a password related subject matter and i think it was in the last 6 months or so

    whoever you are, and i hope you read this: thank you!

    • Re: (Score:3, Insightful)

      by Culture20 ( 968837 )

      pick something you will always remember say "frankie45" lets say the website you are visiting is facebook.com so your password there will be "frankie45face" and your password at twitter.com would be "frankie45twit"

      And if you use the same username on all of the sites, all it takes is one unscrupulous (or incompetent) site manager to quickly have your other accounts accessed.

  • The study makes reference to another analysis down on Unix systems 20 years ago and concludes nothing (much) has changed.
    All this tells us is that the exhortations to choose more secure passwords reaches a certain level and then has no more effect. The implication is that ways of educating users has not improved in the past 20 years.

    Let's not blame the users -they are only doing what they're told. The problem is that we (i.e. IT people) are not telling them the right things in a way that they are willing

    • by CaroKann ( 795685 ) on Thursday January 21, 2010 @09:32AM (#30845550)
      The article concludes that after 20 years of dealing with this problem, "It’s time for everyone to take password security seriously". That is the wrong conclusion. If things have not improved after 20 years, then they are not going to improve ever.

      The password concept needs to be replaced with a better concept. I think the password idea has been proven to be a bad concept due to human nature.
  • I don't know about everyone else, but I don't use my work credentials or my root password when I visit sites that look like rockyou.com. They just aren't important enough for me to use secure passwords. Five letters and a digit is more than enough for me to use on most forums, Myspace, and other unimportant sites -- all of whom I don't trust to actually store my passwords in a secure manner. So I am refraining from commenting on the horrible state of passwords when it concerns a horrible state of a websi
  • by pongo000 ( 97357 ) on Thursday January 21, 2010 @09:27AM (#30845484)

    I don't know if anyone bothered to read the full report [imperva.com], but I found this recommendation tucked in at the end of the report:
    ast character in the password. (pg. 3)

    Allow and encourage passphrases instead of passwords. (pg. 5)

    And I say amen, amen to that. I've done quite a bit of personal research in this area, and have found passphrase systems to be far superior in terms of security and ease of use/recall over random combinations of characters. For years I've used the list provided at Diceware [diceware.com] to generate my passphrases, and I have no problem still recalling little-used 5- or 6-phrase passphrases years later.

    The idea that random sequences of characters is somehow superior to a passphrase of equal entropy is a myth borne of ignorance and a resistance to change. So long as companies that know better keep forcing their minions to adhere to a strict range of letter/number combinations, we'll continue to be saddled with the problem presented by the Rockyou.com crack.

  • I don't know about anyone else, but I have accounts on so many sites it would be impossible to use strong passwords without reuse. I really don't see the harm in using the same weak passwords if I don't care if my account on the site's compromised.

    I have a number of site-specific strong passwords I use on sites I care about, and a further handful of very strong passwords I use for accounts that have the ability to charge my credit cards. My unix passwords are completely different too, and I run sshd needing

  • is doing the same thing over and over while expecting different results.

    I quote the end of this paper:

    "The problem has changed very little over the past 20 years," explained Shulman, referring to a 1990 Unix password study that showed a password selection pattern similar to what consumers select today. "It's time for everyone to take password security seriously; it's an important first step in data security.

    He's correct, of course. The problem hasn't changed. That's because the vast majority of people don't

  • by jollyreaper ( 513215 ) on Thursday January 21, 2010 @09:58AM (#30845866)

    I understand why you don't want to use dictionary words for passwords, too easy to brute-force. Though how likely is it that servers these days would sit still while a single account fails login ten thousand times? I know once the hacker is in, he can then run the hash file against the dictionary and back into the passwords of other accounts. But wouldn't even a dictionary word with a number or two after it be fine? duck1234 should be just as secure as duck!@#$, right?

    I'm running through the ways you can get hacked and what a secure password would mean.

    1. Guessing by a person sitting at your computer, brute force hacker from outside, running the dictionary against the hash -- strong is good.
    2. Your PC gets rooted, your keystrokes are captured -- strength doesn't matter a bit, you typed it in for the hacker and he won't even have to touch the keyboard when his scripts hit your account and drain it.
    3. Data breach and your password is stolen -- Why was it stored in plaintext? Regardless, they have it and can copy and paste if they use it.

    The consensus on security now was that draconian policies on the part of IT without any seeming rhyme or reason to the employee will simply foster non-compliance and animosity towards IT.

  • by Quiet_Desperation ( 858215 ) on Thursday January 21, 2010 @10:04AM (#30845964)
    No "swordfish", huh?
  • Passwords (Score:5, Informative)

    by Stooshie ( 993666 ) on Thursday January 21, 2010 @10:18AM (#30846168) Journal
    I worked for a company that ran a birth/death/marriage certificate site. People were having problems logging in, so we kept a log of passwords that did not result in a successful login.

    We found that one of the most commonly typed passwords that was denied was "case-sensitive".

    Needless to say, we soon took off the "Your password is case-sensitive" text from the login page.
  • by mnslinky ( 1105103 ) * on Thursday January 21, 2010 @12:04PM (#30847684) Homepage

    I've been playing around with the password file, and there are some gross errors in the report.

    First, their top 20 list has many passwords with capital letters, where none actually exist in the 'real' top 20. Also, their numbers are off. I am guess they used a case-insensitive match, which for most passwords will not work. The 'real' top 20, which case respected is:

    290729 123456
    79076 12345
    76789 123456789
    59462 password
    49952 iloveyou
    33291 princess
    21725 1234567
    20901 rockyou
    20553 12345678
    16648 abc123
    16227 nicole
    15308 daniel
    15163 babygirl
    14726 monkey
    14331 lovely
    14103 jessica
    13984 654321
    13981 michael
    13488 ashley
    13456 qwerty

    You can download my list of all common passwords used by more than 1000 people at http://www.secure-computing.net/files/count_gt_1k.txt [secure-computing.net] (1KB file) which maintains case. A file without the counts is at http://www.secure-computing.net/files/gt_1k.txt [secure-computing.net] for use with john, etc.

  • Stupid (Score:3, Insightful)

    by Kral_Blbec ( 1201285 ) on Thursday January 21, 2010 @01:52PM (#30849148)
    There is a very simple way to prevent 100% of brute force attacks. Permenant/temporary lockout after 3 failed attempts. Its a lot harder to make 100 million guesses when you can only make 3 per day.

Think of it! With VLSI we can pack 100 ENIACs in 1 sq. cm.!

Working...