{"id":19319,"date":"2025-02-03T06:50:09","date_gmt":"2025-02-03T11:50:09","guid":{"rendered":"https:\/\/www.knownhost.com\/blog\/?p=19319"},"modified":"2026-01-23T08:09:11","modified_gmt":"2026-01-23T13:09:11","slug":"most-hackable-passwords","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/","title":{"rendered":"Most Hackable Passwords"},"content":{"rendered":"\n<p>Passwords are paramount to making sure that your data stays <a href=\"https:\/\/www.knownhost.com\/application-hosting?aid=1fbdf8c5&amp;d1=google&amp;d2=19843337676&amp;gad_source=1&amp;gad_campaignid=19843337676&amp;gbraid=0AAAAADpyfxFR-RvdTAg4yC0OWPgF6ubD4&amp;gclid=CjwKCAjwo4rCBhAbEiwAxhJlCQNa9cbxwAYUiFNoS4KRIL73pUwDiNyBXvKdsWs6i5bGfGOHH2K3BBoCWBMQAvD_BwE\">private and secure.<\/a> However, the risks of a weak password could mean a serious data breach, with an average data breach in 2024 costing <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">$4.88 million,<\/a> which is a 10% increase from 2023. As 2025 unfolds, it is important to ensure that your passwords are not within popular lists and can be trusted to keep your data safe.<\/p>\n\n\n\n<p>Here at KnownHost, we conducted a study to investigate the most used passwords and how likely they are to be hacked based on how many times the password has been seen in recorded data breaches.<\/p>\n\n\n\n<div class=\"wp-block-group has-background is-vertical is-layout-flex wp-container-core-group-is-layout-8cf370e7 wp-block-group-is-layout-flex\" style=\"background-color:#e9f4ff\">\n<div style=\"height:0px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-9d25eabc\"><\/div>\n\n\n\n<p><strong>Table of Contents:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#1\">Most Hackable Passwords<\/a><\/li>\n\n\n\n<li><a href=\"#2\">Most Common Password Patterns<\/a><\/li>\n\n\n\n<li><a href=\"#3\">Most Common Password Lengths<\/a><\/li>\n\n\n\n<li><a href=\"#4\">How KnownHost Helps Protect Your Passwords<\/a><\/li>\n\n\n\n<li><a href=\"#5\">Why this Matters<\/a><\/li>\n<\/ul>\n\n\n\n<div style=\"height:0px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-9d25eabc\"><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"1\"><strong>Most Hackable Passwords<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"844\" src=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords-1024x844.jpg\" alt=\"password table\" class=\"wp-image-19320\" srcset=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords-1024x844.jpg 1024w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords-300x247.jpg 300w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords-768x633.jpg 768w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords-1536x1266.jpg 1536w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords-2048x1687.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>From the latest <a href=\"https:\/\/www.gbnews.com\/tech\/most-common-passwords-2025\">2025 data,<\/a> the top five most hackable passwords are dominated by simple numeric sequences. \u2018123456\u2019 remains the most common password worldwide, appearing in over 3 million user accounts and involved in more than 50 million data breaches.\u00a0<\/p>\n\n\n\n<p>In second place, \u2018123456789\u2019 has been used 1.6 million times and appeared in 20.5 million breaches. In third, \u20181234\u2019 continues to rank highly due to its short length, making it extremely easy to crack-often in less than a second, as with all passwords in the top ten.<\/p>\n\n\n\n<p>The most hackable letter-based password is \u2018password\u2019, which ranks sixth and has been found in 692,000 user accounts and 11 million breaches, the third highest in the top 10. \u2018Admin\u2019 follows in eighth place, used nearly 250,000 times and involved in almost 5 million breaches.&nbsp;<\/p>\n\n\n\n<p>In tenth position, \u2018abc123\u2019 is the only top-10 password combining letters and numbers, used 331,000 times and involved in 4.2 million breaches.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2\"><strong>Most Common Password Patterns<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"965\" src=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-patterns-v1-1024x965.jpg\" alt=\"most common password patterns\" class=\"wp-image-19321\" srcset=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-patterns-v1-1024x965.jpg 1024w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-patterns-v1-300x283.jpg 300w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-patterns-v1-768x724.jpg 768w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-patterns-v1-1536x1448.jpg 1536w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-patterns-v1-2048x1930.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Across the 200 passwords analyzed, sequences only contain letters and numbers, either alone or in combination. Notably, none of the most common passwords include special characters.&nbsp;<\/p>\n\n\n\n<p>In 2025, 65.5% of the global top 200 passwords are a combination of letters and numbers, 23.5% use only letters, and 11% use only numbers.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"358\" src=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_fact-bubble-1024x358.jpg\" alt=\"password facts\" class=\"wp-image-19322\" srcset=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_fact-bubble-1024x358.jpg 1024w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_fact-bubble-300x105.jpg 300w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_fact-bubble-768x268.jpg 768w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_fact-bubble-1536x537.jpg 1536w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_fact-bubble-2048x715.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>From this, we can see that combinations are the most likely passwords to be used globally, whilst only numbers are the most likely to be involved in data breaches.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"3\"><strong>Most Common Password Lengths<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"974\" src=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-lengths-1024x974.jpg\" alt=\"most common password lengths\" class=\"wp-image-19323\" srcset=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-lengths-1024x974.jpg 1024w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-lengths-300x285.jpg 300w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-lengths-768x731.jpg 768w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-lengths-1536x1462.jpg 1536w, https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_password-lengths-2048x1949.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The character length for the global top 200 passwords ranges from 4 to 15 characters, with eight characters being the most common length (20.5% of all passwords ranked). The least common length is four characters, accounting for just 0.5% of all passwords.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Methodology<\/strong><\/h3>\n\n\n\n<p>For this study, the top 200 passwords used worldwide were seeded from NordPass. These were then loaded into PwnedPwnedPwned to check the frequency of these passwords being hacked, with data breach data spanning from 2007 to 2025. From this, the passwords were then standardized using minmax normalisation. The minmax normalisation value is multiplied by 10 to create a score (between 1-10). A score of 10 is always the best result and this was used to find the new ranking for the most hacked passwords across the globe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2025 Password Trends<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Over 24 billion credentials are exposed each year in data breaches.<\/li>\n\n\n\n<li>23% of people reuse a password across three or four different accounts, and 30% of password thefts are due to password reuse.<\/li>\n\n\n\n<li>The most commonly stolen information in password attacks includes first and last names (39%), phone numbers (38%), and personal addresses (37%).<\/li>\n\n\n\n<li>Only 15% of users rely on a password manager, while 36% still write passwords down on paper.<\/li>\n\n\n\n<li>Pop culture passwords like \u201csuperman,\u201d \u201cblink182,\u201d and \u201cminecraft\u201d remain common and frequently breached.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"4\">How KnownHost Helps Protect Your Passwords<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Secure Account &amp; Server Access<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Two-Factor Authentication (2FA):<br><\/strong>KnownHost supports 2FA for both account management and cPanel\/WHM logins. This means that even if a password is compromised, attackers cannot access your hosting account without a second authentication factor.<\/li>\n\n\n\n<li><strong>SSH Key Authentication:<br><\/strong>For VPS, cloud, and dedicated hosting, you can use SSH keys instead of passwords for server access. SSH keys are virtually immune to brute-force and dictionary password attacks.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. Password Policy Enforcement<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Strong Password Requirements:<br><\/strong>KnownHost\u2019s platforms enforce strong password creation for both hosting accounts and control panels, helping prevent the use of common or easily guessed passwords.<\/li>\n\n\n\n<li><strong>Password Change Tools:<br><\/strong>Users can easily update passwords for all services, and KnownHost recommends regular password updates, especially after any suspected breach.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. Automated Security Tools<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><strong>Imunify360 &amp; Patchman<\/strong>:<br><\/strong>These security suites automatically detect weak or compromised passwords in web applications (like WordPress), alert you to vulnerabilities, and can block brute-force login attempts.<\/li>\n\n\n\n<li><strong><strong>Web Application Firewall (WAF):<br><\/strong><\/strong>Blocks automated attacks that try to guess or brute-force user passwords on your website.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4. SSL\/TLS Encryption<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Free AutoSSL on All Plans:<br><\/strong>All KnownHost hosting plans include free SSL certificates, ensuring that login credentials are encrypted in transit and cannot be easily intercepted by attackers.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">5. Expert Support &amp; Guidance<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>24\/7\/365 Support:<br><\/strong>If you have concerns about password security, KnownHost\u2019s expert support team can guide you on best practices, help you reset compromised credentials, and assist in securing your account.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">6. Backup and Recovery<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Daily Backups:<br><\/strong>In the event of a breach due to a compromised password, KnownHost\u2019s daily backups allow you to quickly restore your website and data to a secure state.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">7. User Access Management<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Multiple User Accounts:<br><\/strong>For reseller, VPS, and dedicated hosting, you can create separate user accounts for team members, each with unique, strong passwords and customizable permissions-reducing the risk associated with shared credentials.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons has-custom-font-size is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\" style=\"font-size:16px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.knownhost.com\/ssl-certificates\" style=\"text-transform:uppercase\"><strong>Secure your passwords now<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"5\">Why This Matters<\/h2>\n\n\n\n<p>By combining strong password policies, two-factor authentication, SSH key support, automated security tools, and expert support, KnownHost dramatically reduces the risk that your website or server will be compromised due to weak or common passwords. This aligns with the latest 2025 password security best practices and helps you maintain a safe, professional online presence.<\/p>\n\n\n\n<p>Sources:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Global Top 200 Passwords &#8211; <a href=\"https:\/\/nordpass.com\/most-common-passwords-list\/\">nordpass.com\/most-common-passwords-list\/<\/a><\/li>\n\n\n\n<li>Number of Data Breaches &#8211; <a href=\"https:\/\/haveibeenpwned.com\/Passwords\">haveibeenpwned.com\/Passwords<\/a><\/li>\n\n\n\n<li>Estimated Time to Crack- <a href=\"https:\/\/bitwarden.com\/password-strength\/\">bitwarden.com\/password-strength\/<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Passwords are paramount to making sure that your data stays private and secure. However, the risks of a weak password could mean a serious data breach, with an average data breach in 2024 costing $4.88 million, which is a 10% increase from 2023. As 2025 unfolds, it is important to ensure that your passwords are [&hellip;]<\/p>\n","protected":false},"author":186,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[83],"tags":[86,1448],"class_list":["post-19319","post","type-post","status-publish","format-standard","hentry","category-blogging","tag-hosting","tag-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Most Hackable Passwords - KnownHost<\/title>\n<meta name=\"description\" content=\"Find out the most hackable passwords and how fast they can be cracked. Stay ahead of hackers with KnownHost\u2019s latest study.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Most Hackable Passwords - KnownHost\" \/>\n<meta property=\"og:description\" content=\"Find out the most hackable passwords and how fast they can be cracked. Stay ahead of hackers with KnownHost\u2019s latest study.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnownHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-03T11:50:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-23T13:09:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2084\" \/>\n\t<meta property=\"og:image:height\" content=\"1717\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jonathan K.W.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:site\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan K.W.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/\"},\"author\":{\"name\":\"Jonathan K.W.\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/8661868db511b07eb455356260f4b0ac\"},\"headline\":\"Most Hackable Passwords\",\"datePublished\":\"2025-02-03T11:50:09+00:00\",\"dateModified\":\"2026-01-23T13:09:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/\"},\"wordCount\":941,\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/KH-hacked-websites-2025_most-hacked-passwords-1024x844.jpg\",\"keywords\":[\"hosting\",\"tips\"],\"articleSection\":[\"Blogging\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/\",\"name\":\"Most Hackable Passwords - KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/KH-hacked-websites-2025_most-hacked-passwords-1024x844.jpg\",\"datePublished\":\"2025-02-03T11:50:09+00:00\",\"dateModified\":\"2026-01-23T13:09:11+00:00\",\"description\":\"Find out the most hackable passwords and how fast they can be cracked. Stay ahead of hackers with KnownHost\u2019s latest study.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/KH-hacked-websites-2025_most-hacked-passwords.jpg\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/KH-hacked-websites-2025_most-hacked-passwords.jpg\",\"width\":2084,\"height\":1717},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/most-hackable-passwords\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Most Hackable Passwords\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"name\":\"KnownHost.com\",\"description\":\"Quality Managed Web Hosting by KnownHost\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\",\"name\":\"KnownHost, LLC\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"width\":1200,\"height\":400,\"caption\":\"KnownHost, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KnownHost\\\/\",\"https:\\\/\\\/x.com\\\/KnownHost\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knownhost\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/8661868db511b07eb455356260f4b0ac\",\"name\":\"Jonathan K.W.\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/author\\\/khwpjkw\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Most Hackable Passwords - KnownHost","description":"Find out the most hackable passwords and how fast they can be cracked. Stay ahead of hackers with KnownHost\u2019s latest study.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/","og_locale":"en_US","og_type":"article","og_title":"Most Hackable Passwords - KnownHost","og_description":"Find out the most hackable passwords and how fast they can be cracked. Stay ahead of hackers with KnownHost\u2019s latest study.","og_url":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/","og_site_name":"KnownHost","article_publisher":"https:\/\/www.facebook.com\/KnownHost\/","article_published_time":"2025-02-03T11:50:09+00:00","article_modified_time":"2026-01-23T13:09:11+00:00","og_image":[{"width":2084,"height":1717,"url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords.jpg","type":"image\/jpeg"}],"author":"Jonathan K.W.","twitter_card":"summary_large_image","twitter_creator":"@KnownHost","twitter_site":"@KnownHost","twitter_misc":{"Written by":"Jonathan K.W.","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/"},"author":{"name":"Jonathan K.W.","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/8661868db511b07eb455356260f4b0ac"},"headline":"Most Hackable Passwords","datePublished":"2025-02-03T11:50:09+00:00","dateModified":"2026-01-23T13:09:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/"},"wordCount":941,"publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords-1024x844.jpg","keywords":["hosting","tips"],"articleSection":["Blogging"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/","url":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/","name":"Most Hackable Passwords - KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/#primaryimage"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords-1024x844.jpg","datePublished":"2025-02-03T11:50:09+00:00","dateModified":"2026-01-23T13:09:11+00:00","description":"Find out the most hackable passwords and how fast they can be cracked. Stay ahead of hackers with KnownHost\u2019s latest study.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/#primaryimage","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords.jpg","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2025\/02\/KH-hacked-websites-2025_most-hacked-passwords.jpg","width":2084,"height":1717},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/blog\/most-hackable-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Most Hackable Passwords"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/blog\/#website","url":"https:\/\/www.knownhost.com\/blog\/","name":"KnownHost.com","description":"Quality Managed Web Hosting by KnownHost","publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.knownhost.com\/blog\/#organization","name":"KnownHost, LLC","url":"https:\/\/www.knownhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","width":1200,"height":400,"caption":"KnownHost, LLC"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KnownHost\/","https:\/\/x.com\/KnownHost","https:\/\/www.linkedin.com\/company\/knownhost"]},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/8661868db511b07eb455356260f4b0ac","name":"Jonathan K.W.","url":"https:\/\/www.knownhost.com\/blog\/author\/khwpjkw\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/19319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/users\/186"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/comments?post=19319"}],"version-history":[{"count":6,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/19319\/revisions"}],"predecessor-version":[{"id":19762,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/19319\/revisions\/19762"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/media?parent=19319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/categories?post=19319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/tags?post=19319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}