Top Security Breaches from the 1600s

For All Things IT Security Conference Related

Join Our Newsletter [Over 50K Subscribers]

Let us send you information on ticket discounts, speaking opportunities and a ton more!

Home / Blog / Top Security Breaches from the 1600s

Top Security Breaches from the 1600s

Tagged Under:

This is a list of the crappest passwords of 2012.


The list comes from the fine folks over at Splash Data. When they compiled this data they certainly had enough security breaches and successful hacks to work with to compile this data, including Yahoo!, LinkedIn, eHarmony and all being hacked.

If you use any of the above passwords – doubtful since our audience are highly educated and experienced information security experts and pentesters 😉 – but just in case – if you do use any of the above then, ahem, better change it. A dictionary attack, rainbow tables, John The Ripper et al will all crack these with no problem at all.

Also of course, users of any of these passwords are the most likely to be victims in future breaches.

Interesting to see that the top three passwords, “password,” “123456,” and “12345678,” remain unchanged from last year’s list.

New entries to this year’s list include “welcome, ” “jesus,” “ninja,” “mustang, ” and “password1.”Top Security Breaches from the 1600’s!

I cam across the document from DeVry University that lays out the “top security breaches since 1600!

Thought it would be great to share.

So here is the list in chronological order. Also just wanna add that there are plenty more massive security breaches. If you think that there is a massive glaring one then please add so in the comments thanks!

1605 – The gunpowder plot. Basically a scheme was hatched to kill King James the 1st of England. The plot failed as every Englishmen will tell you.

1774-1783 – Casanova spied for the Venetian Inquisitors of State.

1775 – The Midnight Ride. Paul Revere warns colonists about movement of British Troops.

1780 – West Point Secrets. Benedict Arnold attempts to sell secrets to the British about American troops and West Point.

1932 – The Enigma Machine. The Polish government’s cryptography agency decoded the cipher for Germany’s early Enigma machines. I thought this was the British actually during the war?

1951 – Soviet Union Spies. US citizens Julius and Ethel Rosenberg passed thousands of documents to the Communists.

1972-1973 – Watergate. US President Nixon was involved in the break-in at the Watergate Hotel where cash found on a guy working for the Nixon campaign.

1986 – Iran-Contra affair. The Iranian government’s weapons-for-hostages deal with the US was leaked.

2008 – Heartland Payment Systems. 134 million credit cards and debit card numbers were stolen from users of Heartland Payment Systems.

2009 – The X-Men Origins Wolverine Leak. An unpublished version of X-Men Origins found its way online before its official release.

2010 – Stuxnet virus. Computer virus Stuxnet was created to hinder the development of Iran’s nuclear power program.

2010 – Wikileaks and the Iraq War Logs. A series of leaked government documents and classified video from the Iraq War were leaked.

2010 – The Gawker Media Hack. The email addresses and passwords for more than 1.3 million Gawker Media readers were compromised.

2011 – Sony PlayStation Network Breach. More than 77 million of Sony’s PlayStation Network accounts were hacked. That’s a lot of people…..

2012 – KT Corporation Hack. User info was stolen from more than 8 million KT mobile phone subscribers in South Korea.

2012 – Wikileaks and the Syria Files. More than 2.4 million private emails to and from ploitical figures in Syria found their way online.

Here is the image – pretty crap quality because I had to lessen the resolution.


Leave a comment or reply below...thanks!