We’ve covered a lot of password security tips and ways to secure your credentials over on our blog The Lockdown. This year, on World Password Day, we thought we’d do things a bit differently and share some of the worst password fails this past year. While these organizations and individuals may not appreciate the extra attention, these password fails all drive awareness and serve as a reminder to improve your own password security. Without further ado, let’s see our top contenders.

Facebook’s Million-Plain-Text-Passwords-Exposed Face Plant

Facebook announced earlier this year that they found 200 to 600 million Facebook account passwords dating back to 2012 exposed in plain text and available to more than 20,000 Facebook employees. Our CTO covers the full story here.

Nutella’s Sweet Mistake

Last year Nutella celebrated World Password Day on Twitter with the worst advice possible, “Choose a word that’s already in your heart.”

Twitter users weren’t impressed and took to the comment sections to share their thoughts:

Nutella_Password_Advice_Fail.png

Elsevier Exposed

What was described by Motherboard as a “rolling list of passwords”, a leader in analytics and science Elsevier, left a server openly accessible from the internet. A researcher saw the list of Elsevier passwords and contacted Elsevier immediately. They then responded by stating that the issue was resolved and were still investigating but that “it appears that a server was misconfigured due to human error.”

Lights Out for LIFX Smart Bulbs

Earlier this year, hacker “LimitedResults” shared how smart LIFX light bulbs can be used to expose anything from Wi-Fi passwords to root certificates. LimitedResults purchased a bulb and downloaded the accompanying app on his Android device where he proceeded to set up his Wi-Fi connection. Once linked, he took apart the bulb using a saw to expose the hardware within. Once inside, he found the ESP32D0WDQ6 system-on-chip (SoC) and fused the board to connect the LIFX hardware. Once connected, he was able to see the plain text Wi-Fi passwords within the SoC’s memory.

Reddit, Wikipedia, and Amazon Still Encourage Poor Passwords

You’d think these tech giants would be at the forefront of cyber security but unfortunately, a research project at the University of Plymouth has monitored their password security habits for the last 11 years and revealed they are still accepting poor passwords. This is incredibly alarming as it perpetuates the use of weak passwords. Nearly every common password was accepted, which included “repeats of the username, the user’s own name and, of course, the all-time classic, ‘password’.'”

A 3 Year Old’s 50 Year Password Mistake

Imagine walking up to your iPad to find your toddler has locked you out of your device for 25,536,442 minutes. This became a reality for Evan Osnos this year when he discovered his toddler had repeatedly attempted to unlock his iPad.

His post received a lot of attention and some password humor:

Password_Humor.png

Eventually, Evan was able to log back in but only after completely wiping his iPad.

Are you updating your password right now? This isn’t a problem you can afford to ignore. Take the time to create a complex, unique string of characters for each account, set up 2-factor authentication, and get a password manager to protect your accounts! Need more proof, here’s how quickly cyber criminals can crack your password using dictionary searches and brute-force attacks.

This World Password Day 2019 let’s hope there will be one less “password fail” to learn from. Let these lessons be a wake-up call for you to update your own password practices. Do you have any password fail stories or password jokes? Share them in the comments below.

Join us tomorrow to celebrate World Password Day 2019 with our password cracking webinar and contest launch!

112 Spice ups

My password is 2/2/2/2; I use autohotkey and the real password fills up upon typing 2/2/2/2.

I’m lazy…

6 Spice ups

Believe it or not we are in the process of implementing Thycotic Secret Server. I tend to ignore the old rules of passwords and choose mine based on information I gathered from an XKCD comic.

55 Spice ups

My nephew said that his password was “1234567890” because it is so obvious that nobody would guess it. I showed him a simulated dictionary attack and pulled the top million passwords that it used.

1234567890 was number 18 on the list.

38 Spice ups

Awesome to hear, Robby! You’ll have to let me know if you have any questions. And this is one of my favorite comics.

Yup, it’s not actual people guessing your passwords based on what they might know about you (although that could still happen too), it’s computer programs using rainbow tables, dictionary lists, and, when all else fails, brute force.

7 Spice ups

I just use “God”, “Gods” or “password” depending on the required number of letters…or 123456…for numbers

4 Spice ups

For my personal accounts, I definitely use a password manager and have a unique long (like 18-char) complex password for just about every different site and service that I use. The very few exceptions are for streaming services at home that I share with my roommates (like Netflix or Plex) where I might need to text them the password when they forget it or when I change it - there I at least pick something they can read off their cell phone and type in. Never do that for anything financial or sensitive of course.

My difficulty at work is that most of my work is on air-gapped networks in labs where I can’t even have my cell phone or any other wireless device with me, so it’s got to be passwords that are complex enough to be secure, but that I can actually remember. Passphrases are good, but I add the additional complexity that since I speak four languages, I mix in words from all of them to make potential dictionary attacks that much more difficult. Sadly, we still are officially required to enforce the “must have upper case, lower case, special characters, and digits” so I have to mix in some of those and hope I remember them okay. And we are still officially required to enforce 60-day expirations, so I’m gonna need new passphrases in a couple of weeks…

9 Spice ups

I don’t have any stories that are too crazy but I do remember going into a server room and seeing the AD username and password taped on the computer screen

¯_(ツ)_/¯

Or when our CEO fell for one of those phishing emails and started sending out bad emails all over the company lol

4 Spice ups

I never use the same password and change mine like my thycotic underwear.

My favorite of all time was - bbMA3.14,dmC2tL-btLwd (bye by Miss American pie, drove my Chevy to the levy…) I miss that password but the song would earworm and now I don’t like that song much.

thycotic.jpg

38 Spice ups

That offline situation sounds rough, EdT. May I make a suggestion? In my world, I break things into untypeable passwords that my password manager handles for me - the 20+ character jumbles - and typeable passwords that have to be entered before the password manager is available (BIOS, BitLocker, Windows, Chromebook, etc). Here’s a tool that I’ve found tremendously helpful for that second categori

https://xkpasswd.net/s/

It admittedly only handles English words, but I find that this combination of parameters yields pretty humane passwords that are still long and complex, as long as your password policies don’t prohibit containing words:

{
“num_words”: 3,
“word_length_min”: 4,
“word_length_max”: 10,
“case_transform”: “RANDOM”,
“separator_character”: “-”,
“padding_digits_before”: 0,
“padding_digits_after”: 3,
“padding_type”: “NONE”,
“random_increment”: “AUTO”
}

for example:

down-leader-WORKERS-805
BECAUSE-great-CENTER-908
further-plains-GRASS-448
PRODUCTS-wish-gate-829
STAR-pounds-FACE-877
after-TIED-fraction-459
plane-settled-CLOSE-187
sent-GIBRALTAR-SOIL-527
black-malta-WESTERN-026
page-country-MANY-082

I find that with a little practice it’s not too bad to memorize a few of those. Of course, your mileage may vary.

Anyway, hope that’s helpful.

3 Spice ups

Had a teacher who wrote their password in their gradebook.

Gradebook went missing for a day, and “mysteriously” some grades got changed.

13 Spice ups

I just took a peek…she did not lost it for a moment.

Then suddenly of the 75% of the class failed (which I failed) so on the average I passed.

4 Spice ups

There’s zero excuse to reuse passwords and have simple (or easy to guess) passwords in 2019. Even Apple and Google have implemented “free” password managers for their smartphones that are a built-in feature at this point. PW Managers suggest passwords for you when you’re on a site, then remember them - even Chrome can do it (although I wouldn’t recommend that). If you’re like me and really paranoid (and enjoy scripting), you can run your own simple Python3 script to generate random passwords, completely offline and client-side. Yes, I know web-based JavaScript PW generators are client side too, but they still require an internet connection to load initially. :stuck_out_tongue:

So…if the password to access my password manager is “password”…hmmmm

3 Spice ups

You can always check how strong your password is here

Mine is 13 thousand years, so I think i’m safe.

12 Spice ups

I remember seeing a poster that talked about setting a more secure password. Had something to do with apples in it but it mainly talked about turning a sentence and using the first letters (and change some of them to numbers as well) into a password.

Wasn’t there also a news story about someone having a picture taken and in the background was a post it note with the wifi password on it. I think there was a Spiceworks post about but I can’t find it.

1 Spice up

I was told my password had to consist of 8 big and little characters, so I chose Snow White & the 7 dwarfs

17 Spice ups

Thanks for posting nutellas password post from 2018!! :smiley:

4 Spice ups

1000 guesses a second is very easy to acheive, of course if you set the system to lock out for 10 minutes after 3-5 wrong guesses then the time scale to crack the password increases consiferably.

The UK National Cyber Security Centre has been advising for some time against forcing regular changes of password in favour of using a complex password that doesn’t need to be changed regularly.

3 Spice ups