Specops Breached Password Report 2025
Specops Breached Password Report 2025
report 2025
Analyzing a year’s worth of malware-stolen credentials
Specops 2025 Breached Password Report
What’s inside?
Report highlights
Executive summary
Weak passwords: Trends and patterns
How hackers use malware to steal passwords
How can organizations reduce password risk?
Eight key takeaways
specopssoft.com 2
Specops 2025 Breached Password Report
Report highlights
Data in this report comes from KrakenLabs, the Threat Intelligence team at Outpost24 (Specops Software’s parent company). In total,
1,089,342,532 stolen passwords captured over a 12-month period were analyzed for this report. The data is accurate as of December
2024, however, we expect the overall trends and patterns to remain consistent. The report also references other pieces of individual
research carried out by the KrakenLabs teams throughout 2024.
Over one billion credentials stolen by malware over a Most common base terms found in stolen passwords:
12-month period analyzed • Five characters: admin
• Six characters: qwerty
230 million stolen passwords meet standard complexity • Seven characters: welcome
requirements • Eight characters: password
• Three most common examples
• Pass@123 Top three stolen password lengths
• P@ssw0rd • Eight characters (189 million)
• Aa@123456 • Ten characters (160 million)
• Nine characters (153 million)
Top five stolen passwords:
• 123456 Most used credential-stealing malware?
• admin • Redline
• 12345678 • Vidar
• password • Raccoon Stealer
• Password
Executive summary
Verizon’s 2024 Data Breach Investigations Report found that over the past 10 years, the use of stolen credentials has appeared in
almost one-third (31%) of all breaches. This prevalence of credential theft has had significant implications for both individuals and
organizations. Stolen credentials can lead to unauthorized access to personal accounts, corporate networks, and financial systems,
resulting in data breaches, financial losses, and reputational damage.
Over the past year, our threat intelligence team has meticulously gathered and analyzed data on a critical and growing cybersecurity
issue: the theft of credentials via malware. This report offers unique analysis into over one billion malware-stolen credentials, helping to
equip organizations with a deeper understanding of the passwords end users are choosing (and reusing), how these attacks are carried
out, and the measures that can be taken to mitigate the risks.
The data collected provides a comprehensive overview of the current credential theft landscape, highlighting the sophistication and
persistence of these threats. Looking into the trends and patterns of these stolen passwords helps build a picture of the passwords real
end users are creating and informs where organizations’ password policies may need strengthening. We’ll also dig into the methods,
trends, and impacts of infostealers and other types of malware that are specifically designed to steal sensitive information such as
usernames, passwords, and other authentication data.
By examining real-world password data and analyzing the techniques used by attackers, we hope to provide you with actionable in-
sights and recommendations to enhance your security protocols and protect against the threat of malware-stolen credentials.
specopssoft.com 3
Specops 2025 Breached Password Report
This means there’s a real chance these stolen credentials are also in use as Active Directory passwords within organizations around the
world. These trends and patterns highlight how weak a lot of passwords out there still are, and where your own password policy might
need strengthening.
Out of the billion passwords analyzed, some common base terms cropped up millions of times. Despite being encouraged to create
unique passwords, the data below shows end users still use weak and easily-guessed base terms to build their passwords. Words like
guest and student suggest many end users are keeping or reusing temporary training and first day passwords. People also still often
go for keyboard walks like qwerty and azerty. We also saw Pakistan commonly used across Pakistani government websites as well as
general sites such as Facebook, Amazon, and Netflix.
specopssoft.com 4
Specops 2025 Breached Password Report
Password length Number of times found Top three most commonly stolen passwords
123456
6 43.6 million 000000
123123
1234567
7 26 million a123456
welcome
12345678
8 189 million Password
Password
123456789
9 153 million Aa@123456
Admin@123
1234567890
10 160 million qwertyuiop
987654321
12345678910
11 115 million Welcome@123
qwerty12345
admintelecom
12 92 million Password@123
Pakistan@123
As you can see from the most commonly stolen ‘complex’ passwords table on the next page, end users often simply adjust weak base
terms by adding capital letters, numbers, or special characters in predictable places (usually starting with a capital and ending with
consecutive numbers). These passwords could be quickly guessed by brute force techniques, as they follow simple and predictable
patterns. Because of this, compliance standards such as NIST are moving away from complexity recommendations and towards in-
creasing password length instead.
This also shows that a password meeting an organization’s password standards doesn’t mean it’s safe. Any password could be stolen
by malware and compromised – no matter its length or complexity. Even if you have a strong password policy, it’s still vital to have a
tool for checking your Active Directory for compromised passwords.
specopssoft.com 5
Specops 2025 Breached Password Report
Inspired by the Paris Olympics Games, earlier in the year our research team revealed that 157,048 sport-related passwords were
compromised by malware in the preceding 12 months. Golf-related passwords were the most frequently stolen, appearing in
40,294 instances. This was followed by football, with 20,550 instances. Sport was a generic theme in that piece of research, but
weak base terms become more problematic when users choose terms specific to your organization as hackers are more likely
to try these in a targeted attack.
Compiling a custom password-exclusion dictionary is a great way to block users from choosing weak base terms. You could
use AI tools like ChatGPT to generate a list of common and predictable passwords, such as ‘admin’ and ‘password’. From there,
you can look for password suggestions and their variations based on organization-specific terms like your company names and
product name. This will help in creating a comprehensive and robust dictionary, which can be periodically refined.
specopssoft.com 6
Specops 2025 Breached Password Report
Your exportable report will give you visibility over the following information and password-related vulnerabilities:
Remember to pay particular attention to end users with known breached or compromised passwords, as these offer a simple
route into your organization for hackers:
Specops Password Auditor: Report showing end users with known compromised passwords
specopssoft.com 7
Specops 2025 Breached Password Report
Stolen credentials can also be used to launch additional attacks, such as phishing campaigns or more sophisticated breaches. Once a
hacker gains access to a system using stolen credentials, they can maintain long-term access, allowing them to gather more data over
time and potentially move laterally within a network to access additional systems. Legitimate credentials representing a trusted identity
make it harder for security software to identify the activity as malicious, as the actions appear to be performed by authorized users.
1. Infection: Infostealers can infect a system through various means, such as phishing emails, malicious downloads, or exploiting
vulnerabilities in software. Once the malware is executed, it gains access to the system.
2. Persistence: To ensure they can continue to gather data over time, infostealers often establish persistence mechanisms. This can
include creating registry entries, modifying system files, or adding themselves to startup processes.
3. Data collection: Infostealers search for and collect various types of sensitive information. For credentials, they typically target:
• Browsers: They can extract saved passwords, cookies, and autofill data from web browsers like Chrome, Firefox, and Edge.
• Email clients: They can steal login credentials and other data from email clients like Outlook.
• FTP clients: They can access and steal credentials stored in FTP clients.
• File systems: They can search for and extract credentials from configuration files, text files, and other data storage locations.
• Clipboard: They can monitor the clipboard to capture any sensitive information that is copied and pasted.
4. Exfiltration: Once the data is collected, infostealers need to send it to the attacker. This can be done through various methods:
• HTTP/HTTPS requests: They can send the data to a remote server using web protocols.
• Email: They can send the data via email to the attacker.
• FTP: They can upload the data to an FTP server.
• Command and Control (C2) Servers: They can communicate with C2 servers to send the data and receive further instructions.
5. Evasion: To avoid detection, infostealers often employ techniques to evade antivirus software and other security measures.
These can include:
• Code obfuscation: Making the code difficult to read and analyze.
• Packing: Compressing the malware to make it harder to detect.
• Rootkit techniques: Hiding the malware’s presence on the system.
• Stealth communication: Using encrypted or obfuscated communication channels to avoid network monitoring.
6. Execution: Infostealers can be programmed to run at specific times or under certain conditions to avoid suspicion. For example,
they might only activate when the user is not actively using the computer.
specopssoft.com 8
Specops 2025 Breached Password Report
Raccoon Stealer are also notable, responsible for 17% and 11.7% of stolen passwords, respectively. Here’s some more info on the top
three stealers we found:
1. Redline
Redline is an extremely popular stealer. It was discovered in March 2020 and its main goal is to export all sorts of personal information,
such as credentials, cryptocurrency wallets, and financial data, then upload it to the malware’s C2 infrastructure. On many occasions, a
Redline payload is delivered along with a cryptocurrency miner to be deployed on the victim’s machine, especially in campaigns where
gamers with powerful GPUs are the preferred target.
From mid-2021 onwards, YouTube has also been used as a distribution method for Redline, in a process as follows:
• Firstly, the threat actor compromises a Google/YouTube account
• Once compromised, the threat actor creates different channels or directly publishes videos on them
• In the description of the uploaded videos (usually ones that advertise gaming cheats and cracks, providing instructions on hack-
ing popular games and software) threat actors will include a malicious link related to the theme of the video
• Users click the link and unwittingly download Redline onto their device, resulting in their passwords and other private informa-
tion being stolen
2. Vidar
Vidar is an evolution of the well-known Arkei Stealer. It checks for the language preferences of the infected machine to whitelist some
countries for further infection. Following that, it generates a Mutex and initializes the strings needed to operate. There are two different
C2 versions available to hackers. The original one is associated with the paid version of Vidar, Vidar Pro. There’s also another C2 version
used in the cracked version of Vidar that is distributed in underground forums, called Anti-Vidar.
In early 2022, Vidar was spotted being distributed in phishing campaigns as Microsoft Compiled HTML Help (CHM) files. Additionally, it
has been detected that the malware is being distributed by the PPI malware service PrivateLoader, the Fallout Exploit Kit, and the Colibri
loader. In late 2023, the malware has been observed being delivered by the GHOSTPULSE malware loader.
3. Raccoon Stealer
Raccoon Stealer is an information-stealing malware offered for sale on the cybercriminal underground. The team behind Raccoon
Stealer uses a ‘malware-as-a-service’ model, allowing customers to rent the stealer on a monthly basis. It was first offered for sale on
the top-tier Russian-language forum Exploit on April 8, 2019. Raccoon Stealer is promoted using the tagline: “We steal, You deal!”
Primarily, it’s been offered for sale on Russian-language underground forums such as Exploit and WWH-Club. On October 20, 2019, the
threat actor also began offering Raccoon Stealer on the infamous English-language Hack Forums. The threat actor marketing Raccoon
Stealer on underground forums occasionally refer to “test weeks,” perhaps indicating that prospective hackers are able to enjoy a trial
run of the product.
The operator behind Raccoon Stealer was recently caught and sentenced to five years in prison.
Our researchers also recently uncovered over two million VPN passwords that were compromised by malware, highlighting a major
risk to organizational security. These passwords, essential for user access to VPNs, now serve as potential entry points for cybercrim-
inals, undermining the primary purpose of VPNs to secure and privatize communications through data encryption. The biggest risk is
when Active Directory passwords are also reused as VPN passwords, which could allow attackers to access all systems and resources
a user has permissions for, leading to extensive damage and theft.
specopssoft.com 9
Specops 2025 Breached Password Report
This gathered threat intelligence is crucial for updating Specops’ extensive breached password database of over 4 billion unique
compromised passwords – and comes from the team that helped power much of the research in this report. This information
helps protect organizations from the real risk behind stealers: groups of traffers (credential trafficking groups) which sell the
passwords to other hackers and ransomware groups.
specopssoft.com 10
Specops 2025 Breached Password Report
As you can see below in the cracking table produced from this research, even a relatively modern algorithm like SHA-256 can’t protect
short, simple passwords from brute-force attacks. On the other hand, it also shows that a hacker would likely be wasting their time
trying to crack a long, complex password that’s been hashed with SHA-256. This proves the value in encouraging end users to create
long, secure passphrases.
Attackers will always prefer to go in search of easy targets and low-hanging fruit. For example, Active Directory passwords that have
already been compromised in data breaches. One way this can happen is through password reuse. You could encourage your end
users to create long, strong Active Directory passwords and store them very securely. But this work is undone if end users reuse those
passwords on personal devices, sites, and applications with weak security.
specopssoft.com 11
Specops 2025 Breached Password Report
specopssoft.com 12
Specops 2025 Breached Password Report
By continuously scanning Active Directory passwords against the Breached Password Protection API, your IT teams can proactively
identify compromised passwords within your organization. Continuous password scans can help detect potential security breach ac-
cess points and enable prompt action to mitigate the risks associated with password reuse. It enables IT teams to automatically identify
compromised passwords and immediately enforce the end user to change it at their next logon.
Incorporating the continuous scan feature into your password policy lets admins ensure compliance with industry best practices and
regulatory requirements. The continuous scan results can be easily reviewed, giving a clear overview of compromised passwords within
a network.
Want to discuss how Specops Password Policy with Breached Password Protection could fit in with your organization?
specopssoft.com 13
Specops 2025 Breached Password Report
3. Many stolen credentials meet standard complexity 7. Malware is one reason password reuse is so danger-
requirements – including 230 million analyzed in this ous. Are your end users reusing work passwords on
report. personal devices and applications with weak security?
4. ‘Complex’ passwords can still be predictable thanks 8. It’s vital to be able to continuously scan your Active
to user behavior. Length is a better indicator of pass- Directory for compromised passwords.
word strength.
specopssoft.com 14
Specops 2025 Breached Password Report
CONTACT US
specopssoft.com 15