The Most Common Passwords of 2025: Did Yours Make the List?

Glitch effectGlitch effectGlitch effect
Glitch banner

Are you using the same password you came up with on your very first login, however many years ago?

You’re not alone. About 23% of people admit to using the same password across three or more accounts. But is it one of the most common passwords?

If your password made this list, it’s time to consider a change. Using easy-to-guess and common passwords is almost as bad as writing your credentials down on a sticky note that you leave on your monitor. We don’t recommend it. 

Learn about some of the most common passwords, the types of threats they pose, and how to better protect yourself from cyber threats. 

Key takeaways

  • The most common password patterns are just a series of numbers: 123456, 123456789, and 12345678. 

  • People are more likely to choose an easy-to-remember password over a more secure one.

  • Weak passwords can lead to credential attacks, like password spraying or brute force attacks.  

  • It’s best to use a long, random, and unique password that combines letters, numbers, and characters.

List of common passwords

NordPass recently compiled a list of the most commonly used passwords based on data exposed during cyberattacks from 44 different countries. The results? Well, they’re not very unique, which isn’t surprising considering password statistics show that 46% of people are more likely to choose an easy-to-remember password than a secure one. 

Here are some of the most common (read: least secure) passwords, all of which take less than a second for a threat actor to guess.   

Rank

Password

1

123456

2

123456789

3

12345678

4

password

5

qwerty123

6

qwerty1

7

111111

8

12345

9

secret

10

123123

11

1234567890

12

1234567

13

000000

14

qwerty

15

abc123

16

password1

17

iloveyou

18

11111111

19

dragon

20

monkey




Weak passwords compromise security  

Using common passwords can lead to common cyberattacks, with 35% of people blaming weak passwords for getting hacked. Many cyberattacks focus on using credentials to gain access to a system, account, or network to cause havoc. 

Here are some examples of cyber threats that target passwords:

Brute force attacks 

A brute force attack is a method where attackers attempt to guess login credentials using automated tools to rapidly cycle through possible password combinations, or manually guess based on personal information gathered on the target.

The effectiveness of this attack hinges on password complexity; simple passwords are cracked quickly, while complex ones can take too long, forcing attackers to move on.

Password spraying

Password spraying is a type of cyberattack where attackers try to access numerous accounts using just a few commonly used passwords. Instead of trying many password variations on a single account, they "spray" one password across a large number of accounts, before moving on to try another common password. 

This tactic helps them avoid triggering account lockout mechanisms that would occur with traditional brute force attacks. Essentially, attackers take advantage of the fact that many people use weak, predictable passwords.

Credential stuffing 

Credential stuffing is when threat actors use lists of stolen usernames and passwords from previous data breaches to gain unauthorized access to other online accounts. They exploit the fact that many people reuse the same credentials across multiple platforms.

Automated tools quickly test these stolen credentials against various websites and services, aiming to find matches. If a match is found, the attacker can access the associated account.

Dictionary attack

A dictionary attack attempts to crack passwords by testing words and number combinations from a list of common terms. Automated tools try these words and variations across accounts.

These attacks target easily guessed passwords, like common words or simple number combinations. Unlike brute force, it focuses on likely choices, making it efficient but vulnerable to complex passwords.

Password security best practices 

Protecting your online accounts starts with strong passwords. In today's digital landscape, where data breaches are increasingly common, relying on weak or easily guessable passwords is a big risk. Here are a few essential tips to enhance your password security:


  • Avoid any of the most common passwords: Using widely known passwords like "123456" or "password" is like leaving your front door unlocked—and wide open. Threat actors have access to vast databases of these common passwords, and automated tools can crack them in mere seconds, granting them easy access to your accounts.

  • Don’t repeat passwords: Reusing passwords across multiple accounts creates a single point of failure. If one of your accounts is compromised, all accounts sharing that password become vulnerable. This domino effect can lead to widespread security breaches and significant data loss.

  • Use a combination of letters, numbers, and characters: Strong passwords are built on complexity. Using both uppercase and lowercase letters, as well as numbers and special characters, makes your passwords significantly harder for threat actors to crack.

  • Use a password manager: Reputable password managers generate and securely store your passwords. This eliminates the need to remember multiple complex passwords and helps you create unique ones for each account.

  • Enable multi-factor authentication (MFA): Activate MFA whenever possible. This adds an extra layer of security by requiring a second form of verification.   

  • Be wary of phishing attempts: Be cautious of suspicious emails or messages that ask for your password. Legitimate services will never request your password via email.

  • Check for breached passwords: Use online tools to see if your passwords have been compromised in past data breaches. If so, change them immediately.



Protect all entry points from cyberattackers

To reduce endpoint weakness, make sure you choose a password not on this list. Creating a unique, long, and random password is the first step to protecting yourself, your business, and your data. 

We understand what threats like credential theft and unauthorized access mean for your business, and we’re here to help. Huntress has you covered with managed identity threat detection and response (ITDR), protecting identities across your organization 24/7.

FAQs

What is the most common password?

123456 is the most commonly used password, with more than 3 million people using it. 

What is the easiest password to crack? 

Any of the most commonly used passwords are extremely easy to crack, including 123456, password, and qwerty. 

What is the strongest password? 

A strong password is long, unique, and random. It should be at least 16 characters long, not reused across multiple accounts, and consist of a random assortment of letters, numbers, and symbols with no personal meaning. 


Share

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.
Huntress at work