Why Even Military Systems Use "admin/123456" and How to Strengthen Your Passwords

The article reveals how millions still use weak passwords like "123456", highlights a Ukrainian military system compromised by default credentials, and offers practical guidelines for creating stronger passwords to protect personal and organizational data.

Programmer DD
Programmer DD
Programmer DD
Why Even Military Systems Use "admin/123456" and How to Strengthen Your Passwords

Weak Passwords Still Threaten Even Military Systems

In 2020, the password “123456” appeared in over 23 million leaked accounts, and the Have I Been Pwned database now contains more than 551 million real passwords.

A recent investigation revealed that Ukraine’s “Dnieper” military automation control system used the default credentials “admin / 123456”, allowing anyone with basic network tools to access switches, routers, servers, printers and even confidential operational plans.

The vulnerability was reported in May 2018, but the response was delayed; only after a month did the defense ministry order a ban on weak passwords, yet many devices still accepted default credentials.

Security experts recommend three simple rules for strong passwords: at least eight characters, no obvious patterns, and a mix of three or more character types such as letters, numbers and symbols.

What are your own password‑creation tips?

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

information securitypassword securitycybersecurityweak passwordsdata breaches
Programmer DD
Written by

Programmer DD

A tinkering programmer and author of "Spring Cloud Microservices in Action"

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.