Most Popular Password Turns Out to Be 123456

If you wonder what happens to all of the data in a typical breach, you simply need to peer into the "dark web," the name given to that part of the internet not indexed by the popular search engines and requiring special tools to access. The dark web hosts multiple activities, many of which are perfectly legal and others that aren't, such as markets for buying drugs, guns and, yes, data pulled off computer systems through illegal means.

Recently, researchers at security firm 4iQ reported that they'd found a database of 1.4 billion clear text credentials, an aggregate database twice as large as any other ever uncovered in the dark web. It was discovered, according to an article posted to Medium by CEO Julio Casal, "in an underground community forum." Casal wrote that none of the passwords were encrypted; after testing a "subset," many were verified to be real and still active. The database aggregated the contents from 252 data breaches, including large ones (LinkedIn) and small ones (Bitcoin).

"This database makes finding passwords faster and easier than ever before," wrote Casal. "As an example, searching for 'admin,' 'administrator' and 'root' returned 226,631 passwords of admin users in a few seconds."

Casal included a list of the 40 most commonly used passwords, along with the count of how many times they were discovered in the database. Here are the top 10:

  • 123456, found 9.2 million times;
  • 123456789, found 3.1 million times;
  • qwerty, found 1.66 million times;
  • password, found 1.3 million times;
  • 111111, found 1.3 million times;
  • 12345678, found 1.1 million times;
  • abc123, found 1.1 million times;
  • 1234567, found 970,000 times;
  • password1, found 952,000 times; and
  • 1234567890, found 880,000 times.

Since the original article appeared, Casal's company has provided a link where users can enter their e-mail addresses and receive truncated versions of passwords included in the database tied to that account. If no exposed passwords were uncovered, 4iQ will also let them know that.

"This experience of searching and finding passwords within this database is as scary as it is shocking," Casal said. "Almost all of the users we've checked have verified the passwords we found were true."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • Interface buttons of Generative AI tool

    Report: No Foolproof Method Exists for Detecting AI-Generated Media

    Microsoft has released a new research report warning that no single technology can reliably distinguish AI-generated content from authentic media, and that deepening reliance on any one method risks misleading the public.

  • illustration of people collaborating around large interlocking gears and data charts

    Why ERP and AI Initiatives Stall at the Execution Layer: A CIO Perspective

    Higher education institutions are investing heavily in ERP modernization, analytics, and AI-driven capabilities. Yet even with these investments, many are running into the same issue: turning insight into coordinated, timely action.

  • large group of college students sitting on an academic quad

    Student Readiness: Learning to Learn

    Melissa Loble, Instructure's chief academic officer, recommends a focus on 'readiness' as a broader concept as we try to understand how to build meaningful education experiences that can form a bridge from the university to the workplace. Here, we ask Loble what readiness is and how to offer students the ability to 'learn to learn'.

  • digital lock on a virtual background

    Encryptionless Extortion on the Rise as Ransomware Groups Shift Tactics

    Ransomware attacks continued to climb in 2025 as attackers increasingly timed operations around year-end staffing gaps and shifted away from traditional file encryption, according to new research from NordStellar.