Why Do Critical Systems Still Use 'admin/123456'? Lessons from Ukraine’s Military Breach

An investigation reveals how weak credentials like "admin" and "123456" persisted in Ukraine’s military control systems, exposing massive data to low‑skill attackers and highlighting the urgent need for stronger password policies across critical infrastructure.

Java High-Performance Architecture
Java High-Performance Architecture
Java High-Performance Architecture
Why Do Critical Systems Still Use 'admin/123456'? Lessons from Ukraine’s Military Breach

In 2020, the overused password "123456" appeared in more than 5 million leaked password lists, representing nearly 3% of users, while the obscure password "ji32k7au4a83" sparked recent discussion on its frequency.

Have I Been Pwned offers a "Pwned Passwords" service that records 551,509,767 real passwords exposed in data breaches; a query for "123456" returns 23,174,662 occurrences.

Although individual users may be cautious, the article questions whether organizations—especially at the military or national level—use even stronger passwords, citing the Pentagon as a notorious target.

Media reports disclosed that Ukraine’s armed forces’ “Dnieper” military automation control system protected its servers with the primitive credentials admin / 123456 .

The same weak pair ranked first and eleventh in the 2017 "Top 100 Weak Passwords" list, and many account systems now prohibit such passwords during registration.

The vulnerability allowed adversaries to scan Ukrainian military information freely until the summer of 2018, as demonstrated by the attacker’s test files.

In May 2018, Ukrainian cyber‑unit specialist Dmitry Vrachok discovered that numerous servers could be accessed with the default credentials "admin 123456," enabling even low‑skill hackers to reach switches, routers, printers, and scanners, and to extract large volumes of confidential data about operations in Donbas.

Although Vrachok reported the issue to the National Security and Defense Committee and the Ukrainian intelligence agency, the report was initially ignored. After more than a month, the Ministry of Defense ordered a ban on weak passwords and periodic checks, yet some IP‑related security concerns were dismissed.

In a July test, devices with default credentials remained accessible, and in some cases computers could connect to the defense network without any password.

Consequently, for nearly four months, many defense‑department servers and workstations continued to use the simple credentials "admin" and "123456".

Security experts recommend three password guidelines: (1) length of at least eight characters; (2) no obvious patterns; and (3) inclusion of at least three character types such as letters, numbers, and special symbols.

The article invites readers to share their own password‑creation tips.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

Information Securitypassword securityCybersecurityweak passwordsadmin123456Ukraine
Java High-Performance Architecture
Written by

Java High-Performance Architecture

Sharing Java development articles and resources, including SSM architecture and the Spring ecosystem (Spring Boot, Spring Cloud, MyBatis, Dubbo, Docker), Zookeeper, Redis, architecture design, microservices, message queues, Git, etc.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.