Here are hackers' 10 favourite passwords

Heisenberg network reveals stolen credentials most commonly used by cyber criminals

Hackers' most popular passwords to use as they try to break into IT systems have been laid bare by security firm Rapid 7.

'X' tops the list of the 10 most common passwords cyber criminals try out, and is followed by Zz, St@rt123, 1, P@ssw0rd, bl4ck4ndwhite, admin, ....... , and administrator.

This is according to Rapid 7's latest paper, The Attacker's Dictionary, which the firm unveiled at RSA Conference 2016.

It focused particularly on credentials attacks on internet-connected point of sale (POS) systems, kiosks, and scamware-compromised PCs that offer Remote Desktop Protocol (RDP) for remote management.

POS units in particular were targeted by lots of cyber criminals, because they can be very lucrative if breached, as several high profile cases, like the Target hack, have shown.

Todd Beardsley, senior security research manager at Rapid 7, told IT Pro: "We were expecting to see a flow of 'normally bad' passwords, such as default admin passwords, because that happens all the time - we see it in home routers and SSH and all the other normal control panels.

"The thing that was really surprising, though, is how stupendously bad these passwords are. Normally you have your list of the top ten, which starts with 'password' and this year probably ends with 'starwars'. These passwords are much worse than that."

Usernames were similarly insecure, with the top ten being: administrator, Administrator, user1, admin, alex, pos, demo, db2admin, Admin, and sql.

Cyber criminals try these usernames and passwords because they are a combination of default passwords not being changed (db2admin: d-b2admin is the default for a number of IBM databases, for example), and ones made to be easy to remember, rather than secure, Rapid 7 believes.

Additionally, some businesses, especially retail, may not be able to change their POS systems' credentials from the default to something more secure because these systems are often installed and managed by a third-party.

"These companies will often have a good IT admin team in the back, but then you have this sort of shadow POS IT hanging off it that is not getting administered particularly well," said Beardsley.

The data the report is based on was collected by Heisenberg, the company's network of low-interaction honeypots - sites that reside on an IP address only, with no registered URL or domain name - that emulate the authentication handshakes of several protocols to passively monitor the internet for waves of credentials-based attacks.

Given there is no legitimate reason for anyone or anything to attempt to connect to the Heisenberg nodes, as they do not offer any services, Rapid 7 assumed this traffic was malicious.

Beardsley said: "We were curious how often opportunistic attacks out on the internet happen and using what protocols - is it mostly HTTP? Is it mostly SSL? - we didn't really know.

"Combining Heisenberg with Operation Sonar, which is sort of the opposite in that it pings the whole internet on a variety of services, I think we can put together a pretty decent picture of what that background radiation is of online crime and fraud."

The Attacker's Dictionary can be downloaded and read in full here.

Featured Resources

Shaping the workplaces of the future

Rise to the challenge

Download now

Enabling a hybrid future

A guide to setting up new working practices

Download now

Seven steps to successful digital innovation and transformation

What to invest in and what to avoid when pursuing digital transformation

Watch now

Defend your organisation from evolving ransomware attacks

Learn what it takes to reduce risk and strengthen operational resiliency

Download now

Recommended

FBI still frowns on ransomware payments
ransomware

FBI still frowns on ransomware payments

11 Jun 2021
AttackIQ teams with VMware to offer expert advice on network security
Security

AttackIQ teams with VMware to offer expert advice on network security

11 Jun 2021
CD Projekt acknowledges stolen data is being circulated online
ransomware

CD Projekt acknowledges stolen data is being circulated online

11 Jun 2021
JBS pays $11 million ransom following cyber attack
ransomware

JBS pays $11 million ransom following cyber attack

10 Jun 2021

Most Popular

Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
GitHub to prohibit code that’s used in active attacks
cyber security

GitHub to prohibit code that’s used in active attacks

7 Jun 2021
WWDC 2021: Apple unveils iOS 15, macOS Monterey and more
iOS

WWDC 2021: Apple unveils iOS 15, macOS Monterey and more

8 Jun 2021