Victoria (VIC) Sun
  • Home
  • Politics
  • Market
  • Finance
  • Investing
  • World
  • Technology
  • Health
No Result
View All Result
Victoria (VIC) Sun
  • Home
  • Politics
  • Market
  • Finance
  • Investing
  • World
  • Technology
  • Health
No Result
View All Result
Victoria (VIC) Sun
No Result
View All Result
Home Technology

Expert Khomutov: Russians lost billions of rubles because of simple passwords

February 20, 2026
in Technology

You might also like

Scientists propose giant glaciers under the ash layer on Mars

The State Duma stated that Telegram cooperates with foreign intelligence agencies

Traces of Tyrannosaurus rex attacking prey found in rare fossils

More than half of Russian Internet users use easy-to-guess passwords. This is happening even as the number of cyberattacks is increasing.

Expert Khomutov: Russians lost billions of rubles because of simple passwords

Modern graphical routines can guess up to 70% of domain passwords in just half an hour. Because of this, even seemingly complex combinations can be vulnerable. The head of the cyber intelligence department of the company Bastion, Konstantin Larin, spoke about this.

Therefore, 45% of stolen passwords officially meet the complexity requirements, but in reality are still susceptible to automated selection. Additionally, about 10% of company employees still use basic combinations, which significantly increases the risk to company data security.

Up to a third of serious cyber incidents in Russian organizations are related to password theft. Hackers often use the credentials of privileged users and system administrators – this access gives them many opportunities within business infrastructure.

“It is currently difficult to accurately estimate the total damage from such incidents, but it is calculated in billions of rubles,” said Ideco director Dmitry Khomutov.

Compliance tends to be formal: users add capital letters, numbers and special characters but continue to create passwords based on predictable patterns (dates, basic words, obvious strings like “qwerty”, “asdf”, etc). “Even if the password looks complex from the point of view of security policy, it can still be a dictionary password – for example, in a combination like “Zima2026!!”. Such options with common words, dates and typical character substitutions have long been on the list of scammers and are used successfully in brute force and account recovery,” said Larin.

Computing power is increasing so today passwords consisting of at least 12 characters, including large and small letters, numbers and special characters, are considered protected from brute force, said Sergei Zolotukhin, cybersecurity consultant at F6.

Larin added that database leaks pose a particular danger. Even if passwords are stored in hashed form, an attacker can still recover the original combinations if they are not strong enough.

Furthermore, password reuse often allows criminals to access several services at once – from email to online banking.

An additional risk factor is the lack of two-factor authentication. The probability of successful account takeover when it is disabled will increase many times. This is especially true in cases where passwords have been included in known leak databases.

To increase protection, Larin recommends avoiding predictable combinations and personal data, refusing to reuse combinations across services, and if possible, using a cross-platform password manager that automatically generates and stores trusted combinations. According to the interlocutor, storing passwords in the browser is risky: when malware infects the device, it can extract data from the built-in storage.

According to Zolotukhin, modern software is really effective in preventing password guessing. This can be the use of an anti-bot program when accessing online resources and an obvious method such as limiting password attempts.

The interlocutor added: “Unfortunately, even such simple settings on their resources are often overlooked by service owners.”

Passwordless authentication methods such as biometrics and hardware tokens have become popular, but a large number of login password pairs are available to criminals in already leaked databases or in new leaks.

“This is a truly dangerous time bomb for society, embedded in mass Internet communications. Unfortunately, even the most advanced expert in digital hygiene cannot protect against this threat,” Zolotukhin concluded. “An effective tool to combat such risks can only be the widespread mastery of the skills of working with cyber intelligence data by specialists and the widespread dissemination of systems of this type in all organizations that are truly interested in customer data.”

Recommended For You

Scientists propose giant glaciers under the ash layer on Mars

February 20, 2026
Scientists propose giant glaciers under the ash layer on Mars

According to the news portal Planet-today.ru, when mentioning ice on Mars, most people think of the polar caps - areas that can be seen from Earth through telescopes...

Read more

The State Duma stated that Telegram cooperates with foreign intelligence agencies

February 20, 2026
The State Duma stated that Telegram cooperates with foreign intelligence agencies

Evgeny Popov, Deputy Chairman of the State Duma's Information Policy Committee, said that Russian authorities have data on voluntary cooperation in Telegram management with foreign intelligence agencies. About...

Read more

Traces of Tyrannosaurus rex attacking prey found in rare fossils

February 20, 2026
Traces of Tyrannosaurus rex attacking prey found in rare fossils

Fossils on display at the Museum of the Rockies in the US show a rare sighting of dinosaur predators. This is the skull of Edmontosaurus (a member of...

Read more

The Telegram press agency reported that there were no mail encryption hacks

February 19, 2026
The Telegram press agency reported that there were no mail encryption hacks

In particular, foreign intelligence agencies do not have access to them. This is how a representative of the service responded to Reuters' request. “The Russian authorities' claim that...

Read more

Google launched the Pixel 10a smartphone with an old design and last year's chip

February 19, 2026
Google launched the Pixel 10a smartphone with an old design and last year's chip

Google introduced the low-cost smartphone Pixel 10a, which is practically no different from its predecessor. Rozetked reported this. The smartphone is equipped with a 6.3-inch P-OLED display with...

Read more
Next Post
People know about the plans of EU countries to tighten procedures for moving diplomats from Russia

People know about the plans of EU countries to tighten procedures for moving diplomats from Russia

Related News

Disputes arose among scientists about protecting the Earth

Disputes arose among scientists about protecting the Earth

February 10, 2026
An iceberg made of grease and feces has caused balls of sewage to appear on the beach.

An iceberg made of grease and feces has caused balls of sewage to appear on the beach.

January 19, 2026
Why do dogs and cats sometimes eat grass?

Why do dogs and cats sometimes eat grass?

November 2, 2025
SpaceX postpones Falcon Heavy launch to July 2026

SpaceX postpones Falcon Heavy launch to July 2026

October 30, 2025
The European Parliament has disabled artificial intelligence for delegates

The European Parliament has disabled artificial intelligence for delegates

February 17, 2026
BİM November 7 Current product catalog 2025: TVs, mobile phones, gaming keyboard-mouse and ironing board coming soon

BİM November 7 Current product catalog 2025: TVs, mobile phones, gaming keyboard-mouse and ironing board coming soon

November 6, 2025
Physicists have revealed what superpower can exist in reality

Physicists have revealed what superpower can exist in reality

October 8, 2025
The insiders revealed the release date of the new Redmi smartphone

The insiders revealed the release date of the new Redmi smartphone

August 4, 2025
Unhappy wife and European husband: what awaits Zelensky at the Munich conference

Unhappy wife and European husband: what awaits Zelensky at the Munich conference

February 13, 2026
  • Politics
  • World
  • Investing
  • Finance
  • Technology
  • Health
  • Market
  • Press release

© 2025 Victoria Sun

No Result
View All Result
  • Home
  • Politics
  • Finance
  • Health
  • Investing
  • Market
  • Technology
  • World
  • Press release

© 2025 Victoria Sun

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?