• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechChanging Face of Security

Here Are the Most Common Passwords Found in the Hacked LinkedIn Data

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
May 18, 2016, 1:41 PM ET
LinkedIn Corp. Expands in China With Local Site Limiting Content
The LinkedIn Corp. website is displayed on an Apple Inc. iPad Air in an arranged photograph in Hong Kong, China, on Tuesday, Feb. 25, 2014. LinkedIn is establishing a Chinese-language website that will restrict some content to adhere to state censorship rules, moving to expand in a country where U.S. technology companies have clashed with the government. Photographer: Brent Lewin/Bloomberg via Getty ImagesBrent Lewin—Bloomberg via Getty Images

A LinkedIn data breach that came to light in 2012 is rearing its ugly head once again. While initial reports said that hackers had stolen 6.5 million account credentials, the latest figures suggest a far greater number were compromised.

Leaked Source, a paid search engine for hacked data, claims to have obtained as many as 167 million purloined account credentials from that LinkedIn breach. Of the total, 160 million included email addresses and 117 million included emails and passwords, one of the site’s administrators told Coins2Day.

Get Data Sheet, Coins2Day’s technology newsletter.

One representative at Leaked Source told Vice Motherboard, which first reported the revised breach figures, that the site’s analysts had decrypted “90% of the passwords in 72 hours.”

Here’s a tally of the most common passwords the site said it unscrambled in the hacked dataset, according to Leaked Source’s analysis. The chart lists 2.2 million instances of passwords, less than 2% of the total cache.

Coins2Day was not able to independently verify the data.

There are notable differences between this set of top passwords and the list released as part of the initial 2012 data breach. An analysis of the earlier dump by the cybersecurity firm Rapid7 (RPD) reported the top five passwords as “link,” “1234,” “work,” “god,” and “job.”

The most recent analysis falls more in line with what we tend to see in data leaks across the web—with the notable exception of “linkedin” appearing in the number two spot.

Leaked Source noted that the stolen LinkedIn passwords were protected with encryption. (They were hashed using the SHA-1 cryptographic algorithm, for the technically minded.) The site pointed out, however, that the passwords had not been “salted,” a security technique that adds a buffer of extra randomness to the passwords, which would have made them considerably more difficult to decrypt.

Cory Scott, LinkedIn’s chief information security officer said Wednesday in a blog post that the company had applied encryption and salting “for several years.” Presumably, the professional network added “salting” after the 2012 breach.

It goes without saying that any of the passwords listed in the above chart are poor choices for securing online accounts. Security experts recommend using a password manager to help generate and store complex, lengthy passwords. They also recommend never reusing passwords across multiple sites and always opting in for two-factor authentication, a feature that ties an additional security code to a user’s device and requests it upon login.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.