Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Exploit Weak Passwords in Just an Hour
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Exploit Weak Passwords in Just an Hour

Highlights

  • Researchers revealed 59% of passwords are crackable within an hour.

  • Modern GPUs drastically enhance the efficiency of password cracking.

  • Human predictability in passwords remains a significant vulnerability.

Kaan Demirel
Last updated: 21 June, 2024 - 11:16 am 11:16 am
Kaan Demirel 11 months ago
Share
SHARE

A recent study by Kaspersky delved into the security vulnerabilities of real-world passwords leaked on the dark web. Researchers focused on assessing the strength of these passwords using modern graphics cards. The results were alarming, revealing that 59% of the analyzed passwords could be cracked in under an hour. This reflects critical flaws in commonly used passwords and the potent capabilities of brute-force attacks enhanced by GPUs. For more details, visit the official report on Cyber Security News.

Contents
Password Cracking TechniquesModern Hardware Exploits

Password Cracking Techniques

Password cracking involves converting a hashed password back to its original form. Historically, passwords were stored in plain text, posing significant security risks. Modern systems mitigate these risks by employing hashing algorithms such as SHA-1, which transforms passwords into unique hash values. When users log in, their provided password is hashed and compared to the stored hash. If there’s a match, access is granted.

Crackers often employ rainbow tables to reverse the hashes back to the original passwords. These tables are pre-computed with hashes for common passwords, allowing swift access to compromised accounts, especially if passwords are reused across multiple platforms. To counter this, password hashing with salt adds a random string to the password before hashing, which creates unique hashes for each user and effectively neutralizes rainbow tables.

Modern Hardware Exploits

Graphics Processing Units (GPUs) have revolutionized password cracking. A high-end GPU like the RTX 4090, paired with software like hashcat, can process 164 billion hashes per second for salted MD5 hashes. This immense computational power means an 8-character password using mixed case letters and digits (36 characters) can be cracked within seconds. Even without owning such hardware, attackers can rent powerful GPUs for minimal costs, enabling them to efficiently crack large databases of leaked passwords.

Comparing this to the capabilities of powerful CPUs (6.7 GH/s), the difference is stark. A CPU might take seven minutes to crack a similar password, while an RTX 4090 does it in just 17 seconds. This accessibility and speed pose a significant threat to password security in real-world scenarios.

Kaspersky’s analysis of real-world passwords exposed numerous vulnerabilities, with 45% being cracked in less than a minute. Smart-guessing algorithms, which prioritize common character combinations, contributed to these findings. Given that each guess is checked against a database of hashed passwords, the time taken to crack all passwords in a database is comparable to cracking a single one.

Past reports highlighted similar issues, noting that human predictability significantly aids password-cracking algorithms. People tend to use familiar phrases, dates, and patterns, making their passwords prone to dictionary attacks. Attempts to create randomness are often biased towards central keyboard keys, further weakening password strength.

Simple substitutions like “pa$$word” or replacing letters with symbols provide little security. Passwords containing dictionary words or frequent symbol combinations can be cracked within minutes or hours, depending on the password’s complexity and the attacker’s computational resources.

With the advent of advanced GPUs, the landscape of password security has dramatically shifted. It’s crucial for users to adopt robust password practices, such as using password managers to generate and store complex, unique passwords. Additionally, implementing multi-factor authentication adds an extra layer of security, making it harder for attackers to gain unauthorized access even if they manage to crack a password.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Strategic Placement of EV Charging Stations in Dubai using Advanced AI Models
Next Article Hackers Master New Tunneling Technique to Evade Detection

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

North American Robot Orders Stabilize in Early 2025
Robotics
UR15 Boosts Automation Speed in Key Industries
Robotics
NHTSA Questions Tesla’s Robotaxi Plans in Austin
Electric Vehicle
Tesla’s Secretive Test Car Activities Ignite Curiosity
Electric Vehicle
AI Reshapes Global Workforce Dynamics
AI Technology
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?