{"id":645,"date":"2015-10-13T12:25:24","date_gmt":"2015-10-13T09:25:24","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=645"},"modified":"2019-07-30T15:04:52","modified_gmt":"2019-07-30T12:04:52","slug":"ashley-madison-passwords","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/ashley-madison-passwords\/","title":{"rendered":"The Most Popular Passwords of Ashley Madison Users &#8211; Overused, Predictable and Unreliable"},"content":{"rendered":"<p>Ashley Madison is a popular Canadian resource for users who do not mind to leave the line of a faithful husband and have some fun on the side. The basis for the creation of Ashley Madison was the idea of a dating site for the purpose of adultery, which is evident from the motto on its main page \u00abLife is short. Have an affair \u00bb.<\/p>\n<p>August 19, 2015 was a \u201cfateful day\u201d for many users of the site, as well as for their spouses, as a group of hackers \u201cThe Impact Team\u201d have successfully compromised 11.7 million user passwords and posted on the Internet the data of 36-million people who used the services of Ashley Madison.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-648 aligncenter\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/ashley-madison-statistics1.png\" alt=\"Ashley Madison Stats\" width=\"599\" height=\"592\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/ashley-madison-statistics1.png 599w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/ashley-madison-statistics1-300x296.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/ashley-madison-statistics1-60x60.png 60w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<h2>The list of popular Ashley Madison passwords<\/h2>\n<p>The team of hackers CynoSure Prime have analyzed the data of the most popular Ashley Madison passwords and found out that more than 15 million of them have been cracked by the algorithm MD5, which makes the process of <a href=\"https:\/\/www.protectimus.com\/blog\/brute-force-attack\/\">brute force<\/a> much easier. The published statistics shows that among 11,716,208 users of the site only 4,867,246 people used a unique password to protect data, while the remaining users did not worry about the security of confidential information and used standard overused passwords. Moreover, in 630,000 cases the password and the username were completely the same.<\/p>\n<p>Most passwords were extremely simple: mostly lowercase letters, sometimes with numbers. Brute force probably began according to the list of most common passwords in keeping with the version of the list created in 2005, \u201c500 worst passwords of all times\u201d. And it has paid off. The ten most popular passwords in 2015 among the Ashley Madison cheaters are included in the top twenty of the easiest passwords in the world.<\/p>\n<p>Below is the list of the most frequently used passwords according to the hackers of Ashley Madison:<\/p>\n<ol>\n<li>123456<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4812 alignright\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/Ashley-Madison-passwors-cloud-white-2.jpg\" alt=\"Popular passwords of Ashley Madison users\" width=\"625\" height=\"253\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/Ashley-Madison-passwors-cloud-white-2.jpg 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/Ashley-Madison-passwors-cloud-white-2-300x122.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/Ashley-Madison-passwors-cloud-white-2-768x311.jpg 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/10\/Ashley-Madison-passwors-cloud-white-2-610x247.jpg 610w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/li>\n<li>12345<\/li>\n<li>password<\/li>\n<li>DEFAULT<\/li>\n<li>123456789<\/li>\n<li>qwerty<\/li>\n<li>12345678<\/li>\n<li>abc123<\/li>\n<li>pussy<\/li>\n<li>1234567<\/li>\n<\/ol>\n<p>As we can see, most of the passwords used by people are too simple and predictable, but due to human laziness, lack of wit, or the inability to remember complex combinations people continue using them. Thus, users keep making the same mistakes, which in inappropriate moments bring a lot of unexpected troubles, it\u2019s painful and it hurts in the most vulnerable places. In the Ashley Madison users\u2019 case, it can even destroy families.<\/p>\n<h2>Two-factor authentication &#8211; a way out for the predictability of most commonly used passwords and the ideal solution for data protection<\/h2>\n<p>Experts believe that the hacking of Ashley Madison was successful because of the carelessness of the developers of the resource, even though it is not known whose fault it was. But the result is obvious. Having started their work in 2001, the creators of the site used a one-step authentication, which means using only a username and password. One-factor authentication gave all the \u2018trumps\u2019 to the hackers, and they could easily compromise the accounts.<\/p>\n<p>This would not have happened if the login to the site was carried out by means of two-factor authentication, which means that after the entering of login and password a one-time password is sent to the user\u2019s mobile phone, token, or email. This one time password might be the deterrent that would protect adulterers\u2019 profiles from being compromised, and keep their unaware wives and husbands from unpleasant discoveries.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Ashley Madison is a popular Canadian resource for users who do not mind to leave the line of a faithful husband and have some fun on the side. The basis for the creation of Ashley Madison was the idea of a dating site for the purpose of adultery, which is evident from the motto on [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":4557,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7],"tags":[166,163,99],"class_list":["post-645","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","tag-hacking-attacks","tag-passwords","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=645"}],"version-history":[{"count":8,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/645\/revisions"}],"predecessor-version":[{"id":5368,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/645\/revisions\/5368"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4557"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}