Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 25 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Millions of Keyboard Walk Patterns Found in Compromised Passwords

Keyboard Walk “Qwerty” Found in Compromised Passwords More Than 1 Million Times

by Guru Writer
July 18, 2023
in Editor's News
Blue logo, capitalised letters. SPECOPS.
Share on FacebookShare on Twitter

Today, the Specops Software research team revealed the results of their latest findings on the use of keyboard walk patterns in compromised passwords. The top keyboard walk pattern found in compromised password was ‘qwert’, followed by ‘qwerty’ which found in compromised passwords more than 1 million times.

Keyboard walk patterns are passwords compromised of keys that are located next to each other on the user’s keyboard.

The Specops team analysed an 800 million password subset of the largest Breached Password Protection database, which includes over three billion breached passwords.

To carry out the research, the Specops research team used a generator to create a list of common keyboard walk patterns. The Specops team only looked for patterns that included 5 characters or more, as well as phrases that occur outside of ‘normal’ language.

The words generated came from three common (Latin alphabet) keyboard layouts:

  1. Qwerty: common in America and many regions across Europe (with slight modifications)
  2. Azerty: mostly used in France and Belgium
  3. Qwertz: Widely used in Germany and Central European countries

The top Querty keyboard walk pattern found in compromised passwords was qwerty, which was found over 1 million times. This was followed by qwert, werty, asdfg.

The top three Azerty keyboard walk patterns found in compromised passwords were xcvbn (found over 143,000 times), asdfg, and tress.

Similarly, the top three Quertz keyboard walk patterns found in compromised articles were qwert (found over 1.4 million times), asdfg, and xcvbnm.

“We find keyboard walk patterns in compromised password data because users are human,” said Darren James, Senior Product Manager at Specops Software. “But the danger is that attackers also know this. Any IT team looking to shore up their defences against this particular prevalent password behaviour would be smart to block these specific patterns. Smarter IT teams would go further and make sure to block the use of any known compromised password.”

To protect against breached passwords, Specops suggest using tools that scan for compromised passwords within an organisation.

Earlier this year, Specops released the 2023 Weak Password Report, which found that 83% of compromised passwords satisfy the password length and complexity requirements of regulatory password standards.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Dragos Accelerates Growth in Europe, Expands Leadership Team

Next Post

New Outpost24 CORE Solution Announced Bringing Visibility, Cyber Resilience & Threat Mitigation

Recent News

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

September 25, 2023
Nurturing Our Cyber Talent

Nurturing Our Cyber Talent

September 25, 2023
The Journey to Secure Access Service Edge (SASE)

The Journey to Secure Access Service Edge (SASE)

September 22, 2023
WatchGuard

WatchGuard acquires CyGlass for AI-powered network anomaly detection

September 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information