Ashley Madison subscribers choose Rotten Passwords

I suppose we should expect this, since we know how bad people are at choosing passwords, but you’d think that on a site dedicated to indiscretions people would be a little more careful.

These choices of passwords could turn out to be the most embarrassing thing we learn about Ashley Madisonizens, even more than their marital infidelities:

“Ashley” and “Madison” and “qwerty” were also popular (So are, intriguingly, in context, “fuckyou” and “fuckme”), but “123456” heads the list.
Actually, its not entirely fair to characterize this as I have – these were the passwords that could be broken, and a lot of them haven’t been. So these are really the top “weak” passwords. I’m still surprised people would use them in this context.

Wonder where “horney” was on the list.

Probably some ways down from “horny”. Just because people are stupid password-pickers doesn’t mean they all misspell words the same way.

Horny is not six characters.

From the quoted article, 123456 was used a mere 202 times out of 36 million accounts. Yawn.

True. Not being a subscriber I wasn’t aware that was a requirement at that site.

IMO “HornyMe” or variations would be a more plausible choice than “horney”. Unless there area lot of people who really spell it that way. Although I suspect a lot of folks have never had occasion to write that word at all and have no fixed idea of how it is or should be spelled.

Well, 202 times out of the 4000 they decrypted. That’s 5%, so it’s not as big a yawn.

If I understand it correctly, cracking the passwords is a process involving brute-force guessing for each password. That starts with easy guesses: known common passwords, maybe an exhaustive search of the 6-character password space, dictionary words, and from there longer passwords perhaps focused on common patterns used by most people. They probably found all examples of “123456” and “password” in the entire 36 million passwords.

Luckily for the users here, passwords were properly stored so only the really weak passwords are going to be broken.

The first rule of Ashley Madison was what again… Oh yeah. Never admit to… :wink:

who wants to bet that those 202 people used the same 123456 password for their e-mail and bank accounts too?

That’s the kind of combination an idiot would put on his luggage!

123456 is a good idea for a password if you’re going to be typing with one hand.

Then again, so is “farted” but it’s a little off, contextually.

Apparently there were almost zero real women actually “using” the site. Ashley Madison was a scam.

It shows people use these passwords because they don’t understand how weak they are, not because they don’t care whether they’re strong or not.

According to the blog describing the cracking attempt, they were using the (now famous) RockYou password list. Any password that wasn’t on that (admittedly large) list wasn’t going to get cracked. So it’s 5% of the bad passwords.
(Edit: Sorry, I missed the post where you pointed out this already.)

To me, the more interesting thing is that AM was using actual good password storage - salted hashes using bcrypt. Given everything else we’ve learned recently about the company, I was expected unsalted MD5, or maybe plaintext. The rate of 156 guesses per second on a state-of-the-art custom built password cracking machine is really quite slow.

The examples given are the same top passwords on all sites. You would need to look at the percentiles to figure out if the AM crowd were particularly better or worse, on average, than the greater internet.

:smiley:

Old joke:

What’s the longest word you can type with just your left hand?

Stewardesses

That was what I took away, too. They had at least one competent security guy on staff at some point. Basically those passwords are not going be cracked, other than the mind-numbingly simple 123456-esque ones.

It was a really high-end lock they put on that door they didn’t bother to close.

123456 is far too obvious - that’s why I use 234567 for all of my important financial accounts. Same ease of typing, but they never guess.

Wait . . .

Update:

Turns out AM used some laughably terrible password security after all. While the primary password database used bcrypt to securely hash passwords, the passwords were also stored as MD5 hashes. Even worse, the insecurely hashed version converted uppercase to lowercase, so it was even easier to brute force guess the all-lowercase versions, and trivial to find uppercase characters in bcrypt hashed passwords.

Net result is that all the AM passwords are about a million times easier to crack than previously thought. After ten days of crunching, 11 million passwords have been cracked…