We integrate a constantly growing, proprietary, carefully curated 18-billion-plus database of breached credentials into our software products through our company Cyber Intel Matrix.

It is difficult to accurately estimate the number of leaked or breached credentials that are available on the dark web, as the dark web is a hidden and unregulated portion of the internet that is not easily accessible to the general public. However, it is clear that the number of leaked or breached credentials available on the dark web is significant and continues to grow over time.

There have been a number of high-profile data breaches in recent years that have resulted in the exposure of millions of login credentials, including passwords and usernames, to the dark web. In some cases, these credentials are then sold or traded by cybercriminals on the dark web or other online forums.

It is important to note that the use of strong, unique passwords and enabling two-factor authentication (2FA) can help to protect against the use of leaked or breached credentials. It is also a good idea to regularly change your passwords and to be cautious when providing personal information online, as this can help to reduce the risk of your credentials being compromised.

The 20 most common passwords used among breached credentials, according to Lookout:

  1. 123456
  2. 123456789
  3. qwerty
  4. password
  5. 12345
  6. 12345678
  7. 111111
  8. 1234567
  9. 123123
  10. qwerty123
  11. 1q2w3e
  12. 1234567890
  13. DEFAULT
  14. 0
  15. Abc123
  16. 654321
  17. 123321
  18. Qwertyuiop
  19. Iloveyou
  20. 666666

Hackers often target personal identifying information (PII) and login credentials, such as usernames and passwords, to gain access to sensitive information and financial accounts. Other types of credentials that are commonly targeted by hackers include:

  • Social Security numbers
  • Credit card numbers
  • Financial account information (e.g. bank account numbers, routing numbers)
  • Personal contact information (e.g. email addresses, phone numbers)
  • Passwords for online accounts (e.g. email accounts, social media accounts)
  • Two-factor authentication (2FA) codes
  • Access credentials for enterprise systems and networks

Hackers may use various techniques to obtain these types of credentials, such as phishing scams, malware, and social engineering tactics. Additionally, hackers may also try to obtain credentials by exploiting known vulnerabilities in software or hardware.

It’s best practice to have different and strong password for each account and enable two-factor authentication wherever possible.