A recent Kaspersky investigation exposes the high vulnerability of online users, revealing that most leaked passwords are not only weak from the moment of creation but also persist unchanged for years. In 2025, 54% of compromised passwords were already found in previous data breaches, confirming that the average lifespan of a leaked password is between 3.5 and 4 years. One of the key risk factors is the reuse of the same passwords across multiple platforms. This means that a data breach on one site can lead to unauthorized access to many other user accounts. Experts note that the difficulty of managing dozens of passwords and changing them frequently has become an insurmountable task for many users, which only exacerbates the problem. Cybercriminals use advanced tools capable of testing millions of combinations per second. Finding predictable patterns, such as '12345' or the use of personal information, increases the risk exponentially, which can lead to information theft, identity impersonation, or loss of access to essential services. To strengthen protection, Kaspersky experts recommend using long and unique passwords for each service, activating two-factor authentication (2FA), and not clicking on suspicious links in emails or SMS messages. Additionally, specialists advise keeping applications updated and migrating to modern authentication methods, such as passkeys. A passkey is a passwordless login system that uses cryptographic keys and the device's biometric data (such as a fingerprint or facial recognition) for more secure access.
Kaspersky warns: 54% of leaked passwords in 2025 are reused old ones
A Kaspersky study shows that over half of the compromised passwords were already found in past breaches. Experts explain why reusing weak passwords is a huge risk and what modern authentication methods should be implemented to protect accounts.