Why Even Military Systems Use "admin/123456" and How to Strengthen Your Passwords
The article reveals how millions still use weak passwords like "123456", highlights a Ukrainian military system compromised by default credentials, and offers practical guidelines for creating stronger passwords to protect personal and organizational data.
Weak Passwords Still Threaten Even Military Systems
In 2020, the password “123456” appeared in over 23 million leaked accounts, and the Have I Been Pwned database now contains more than 551 million real passwords.
A recent investigation revealed that Ukraine’s “Dnieper” military automation control system used the default credentials “admin / 123456”, allowing anyone with basic network tools to access switches, routers, servers, printers and even confidential operational plans.
The vulnerability was reported in May 2018, but the response was delayed; only after a month did the defense ministry order a ban on weak passwords, yet many devices still accepted default credentials.
Security experts recommend three simple rules for strong passwords: at least eight characters, no obvious patterns, and a mix of three or more character types such as letters, numbers and symbols.
What are your own password‑creation tips?
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Programmer DD
A tinkering programmer and author of "Spring Cloud Microservices in Action"
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
