
The use of weak passwords remains one of the major risks to digital security around the world. An international study determined what the most common symbols are What are the most dangerous patterns in personal access management?
The survey was conducted through analysis Over two billion credentials Leaked on forums and digital platforms. The report warns that it is easy for cybercriminals to access accounts containing this type of information.
The British portal specialized in electronic security, comparison, He led the investigation that was exposed on various technological platforms and media. The study took data from various social networks, e-commerce sites and messaging services where large amounts of compromised passwords appeared.
The results reflect the global trend of choosing digital installationssimple words or keyboard sequences that are easy to guess, either by people or by automated programs designed to decode the keys.
The analysis highlights that the most frequent keys maintain the same structure over time. Users prioritize convenience and quick savingWhich increases the risk of unauthorized access.
Experts agree that personal, economic and social information is exposed when secure authentication mechanisms are not adopted.

The report lists which The 10 most used passwords by users in 2025with hundreds of thousands to millions of events each.
- 123456
- 12345678
- 123456789
- Responsible
- 1234
- AA123456
- 12345
- password
- 123
- 1234567890
groups like “QWERTY” (initial keyboard letters) and “admin123“Also found in List of the top 100 global companies.
The word “minecraft”associated with the popularity of the video game, appears between The 100 most used by 2025.

The study also notes this Many keys consist of strings of ascending or descending numbers And 25% of the most commonly used passwords consist of numbers only.
according to comparison, 38.6% of digital passwords contain the sequence “123”. 2% use inverted combinations of “321”.
In addition, 3.1% of the classics include a string of letters “ABC”. These patterns are intended to make recall easier, but also allow cybercriminals to quickly identify them using automated systems.

The report appreciates this A third of the leaked keys are less than 12 characters long and? Only 3.2% go beyond 16 characters.
The report highlights the concept “human laziness” like One of the main reasons behind this lack of security. When searching for speed, many Internet users repeat passwords, modify just one character, or use dates of birth as an easy-to-remember resource.
The result is massive exposure, and many attacks occur without direct user intervention.

Using predictable combinations leaves millions of accounts exposed. Cybercriminals scan leaked databases and use software capable of testing thousands of variables in seconds. So They were able to access confidential information, steal money, and blackmail victims And control personal or corporate files.
The British company warns that the most secure passwords go beyond 12 letters And merge Uppercase and lowercase letters, numbers and symbols There are no simple patterns.
It is recommended to avoid well-known sequences, proper names, or personal details. To extend protection, the report suggests that each account use a unique key And users enable two-step authentication systems.

This method adds a layer of verification to your email or phone, which… Reduces the possibility of theft even if the password is discovered.
The study adds that 65.8% of the passwords analyzed do not meet the minimum standards for length and complexity. On platforms where confidential or financial information is managed, Adopting strong practices is essential to avoid break-ins.

A team of cybersecurity experts points out that strong keys do not show recognizable patterns or clear data, like a direct digital string.
Using automatic generators makes it easy to create unique passwords. Password management applications allow you to store different keys And complex without relying on memory.

Another aspect that specialists consider vital is education about digital risks. By reporting the tendency to use weak passwords, platforms and services seek to foster a culture of self-defense online. The report highlights that despite technological advances, information security largely depends on small individual habits.
Regularly updating passwords, combining diverse characters, and multiple authentication are some of the most effective tools to reduce the threat of attacks. Users and businesses should review access policies and adopt technologies Which enhances privacy in all digital environments.