Nearly half of world’s passwords crack in under a minute

Craig Nash
By
Craig Nash
AI-powered tech writer covering artificial intelligence, chips, and computing.
7 Min Read
Nearly half of world's passwords crack in under a minute — AI-generated illustration

Password cracking vulnerability has reached a critical threshold. Kaspersky researchers analyzing 231 million unique passwords from dark-web leaks between 2023 and 2026 found that 48% can be cracked in less than a minute, up from 45% in their 2024 study. The trend is unmistakable: as hardware becomes faster and algorithms smarter, the passwords most people rely on are becoming trivially easy to break.

Key Takeaways

  • 48% of analyzed passwords crack in under one minute, up from 45% in 2024
  • 60% can be cracked within an hour; 68% within a day
  • Short passwords (8 characters or fewer) fall to brute force in under a day
  • Smart algorithms exploit predictable patterns like “qwerty,” “12345,” and date sequences
  • Password cracking is accelerating due to faster hardware and AI-powered tools

Why Password Cracking Vulnerability Keeps Getting Worse

The acceleration is real. Kaspersky’s 2026 update shows password cracking vulnerability worsening across every timeframe measured. Sixty percent of passwords now crack within an hour, up from 59% in 2024. Sixty-eight percent fall within a day. These are not marginal increases—they reflect a fundamental shift in the threat landscape. Modern GPUs and specialized cracking hardware have made brute-force attacks practical at scale. An 8-character password using only lowercase letters and digits takes just 17 seconds to crack on a modern GPU. Even on a standard laptop CPU, the same password yields in seven minutes.

But raw computing power tells only half the story. Smart algorithms now account for human predictability. They exploit character substitutions (“e” becomes “3,” “a” becomes “@”) and common sequences like “qwerty,” “asdfg,” and “12345”. Kaspersky’s analysis found that 53% of passwords end with digits, 17% begin with digits, and roughly 12% include date-like numeric sequences between 1950 and 2030. These patterns are not random—they are deliberate shortcuts people take because they think they are being clever. They are not.

How Long Until Your Password Falls?

The numbers are sobering. Kaspersky’s breakdown reveals the cracking timeline for passwords analyzed in their study: less than one minute (48%), less than one hour (60%), less than one day (68%), less than one month (74%), less than one year (77%), and over one year (23%). That 23% figure—passwords that resist cracking for more than a year—represents the bare minimum of what users should aim for. Yet three-quarters of all analyzed passwords fall within a month.

Length matters enormously. Passwords of 15 characters or longer show a marked improvement: more than 20% of them resist cracking in under a minute via AI-powered smart algorithms. The jump from 8 to 15 characters is the difference between trivial and difficult. Yet most users still stick to shorter passwords because longer ones are harder to remember. This is the core tension: human convenience versus security.

The Shift Away From Passwords Altogether

Kaspersky’s research implicitly argues for something bigger: moving beyond passwords entirely. The security industry is increasingly pushing toward passkeys and biometric authentication, which sidestep password cracking altogether. A passkey cannot be cracked by brute force because it does not exist as a guessable string. This is not a minor upgrade—it is a fundamental architectural change. Specops, another security firm, found that 98.5% of breached passwords in their analysis were crackable in minutes, underscoring how universal the problem has become.

The challenge is adoption. Most websites and apps still rely on passwords. Passkeys are spreading—Apple, Google, and Microsoft all support them—but the transition is slow. Until that shift is complete, users are stuck defending themselves with tools that are mathematically indefensible at scale.

What You Should Do Right Now

If you are using passwords shorter than 15 characters, you are in the vulnerable majority. If your passwords follow predictable patterns—ending in digits, using common sequences, or substituting “3” for “e”—you are in even greater danger. The practical steps are straightforward: use a password manager to generate and store truly random passwords of 16+ characters, enable multi-factor authentication everywhere it is available, and migrate to passkeys where the service supports them.

A password manager removes the memory burden that drives people to weak passwords in the first place. It generates random strings like “7kQ9mX2pL8vN5wR” that have no pattern, no dictionary words, and no exploitable structure. These passwords are not uncrackable—nothing is—but they resist cracking for years rather than minutes.

Are all passwords equally vulnerable to cracking?

No. Short passwords (8 characters or fewer) and those using common patterns crack fastest. Passwords of 15+ characters, especially those with random character mixes, resist cracking far longer. Kaspersky found that while 48% of all analyzed passwords crack in under a minute, that figure drops dramatically for longer, more complex passwords.

Why is password cracking getting faster?

Hardware acceleration and smarter algorithms are the primary drivers. Modern GPUs are millions of times faster than CPUs for password cracking. AI-powered tools also exploit human predictability—they know that passwords often follow patterns like dates, common words, or keyboard walks. This combination makes brute-force attacks practical and smart-dictionary attacks devastatingly effective.

Should I switch to passkeys right now?

If your bank, email provider, or social media platform supports passkeys, enable them immediately. They are more secure than even the strongest password because they cannot be guessed or brute-forced. However, most services still require passwords as a fallback, so you cannot abandon passwords entirely yet. Use a password manager for now, and migrate to passkeys as support expands.

The password cracking vulnerability crisis is not theoretical—it is happening now. Kaspersky’s data shows that nearly one in two passwords falls in seconds. The only question is whether you will act before yours does.

This article was written with AI assistance and editorially reviewed.

Source: TechRadar

Share This Article
AI-powered tech writer covering artificial intelligence, chips, and computing.