Victoria (VIC) Sun
  • Home
  • Politics
  • Market
  • Finance
  • Investing
  • World
  • Technology
  • Health
No Result
View All Result
Victoria (VIC) Sun
  • Home
  • Politics
  • Market
  • Finance
  • Investing
  • World
  • Technology
  • Health
No Result
View All Result
Victoria (VIC) Sun
No Result
View All Result
Home Technology

Expert Khomutov: Russians lost billions of rubles because of simple passwords

February 20, 2026
in Technology

You might also like

The State Duma stated that Telegram cooperates with foreign intelligence agencies

Traces of Tyrannosaurus rex attacking prey found in rare fossils

The Telegram press agency reported that there were no mail encryption hacks

More than half of Russian Internet users use easy-to-guess passwords. This is happening even as the number of cyberattacks is increasing.

Expert Khomutov: Russians lost billions of rubles because of simple passwords

Modern graphical routines can guess up to 70% of domain passwords in just half an hour. Because of this, even seemingly complex combinations can be vulnerable. The head of the cyber intelligence department of the company Bastion, Konstantin Larin, spoke about this.

Therefore, 45% of stolen passwords officially meet the complexity requirements, but in reality are still susceptible to automated selection. Additionally, about 10% of company employees still use basic combinations, which significantly increases the risk to company data security.

Up to a third of serious cyber incidents in Russian organizations are related to password theft. Hackers often use the credentials of privileged users and system administrators – this access gives them many opportunities within business infrastructure.

“It is currently difficult to accurately estimate the total damage from such incidents, but it is calculated in billions of rubles,” said Ideco director Dmitry Khomutov.

Compliance tends to be formal: users add capital letters, numbers and special characters but continue to create passwords based on predictable patterns (dates, basic words, obvious strings like “qwerty”, “asdf”, etc). “Even if the password looks complex from the point of view of security policy, it can still be a dictionary password – for example, in a combination like “Zima2026!!”. Such options with common words, dates and typical character substitutions have long been on the list of scammers and are used successfully in brute force and account recovery,” said Larin.

Computing power is increasing so today passwords consisting of at least 12 characters, including large and small letters, numbers and special characters, are considered protected from brute force, said Sergei Zolotukhin, cybersecurity consultant at F6.

Larin added that database leaks pose a particular danger. Even if passwords are stored in hashed form, an attacker can still recover the original combinations if they are not strong enough.

Furthermore, password reuse often allows criminals to access several services at once – from email to online banking.

An additional risk factor is the lack of two-factor authentication. The probability of successful account takeover when it is disabled will increase many times. This is especially true in cases where passwords have been included in known leak databases.

To increase protection, Larin recommends avoiding predictable combinations and personal data, refusing to reuse combinations across services, and if possible, using a cross-platform password manager that automatically generates and stores trusted combinations. According to the interlocutor, storing passwords in the browser is risky: when malware infects the device, it can extract data from the built-in storage.

According to Zolotukhin, modern software is really effective in preventing password guessing. This can be the use of an anti-bot program when accessing online resources and an obvious method such as limiting password attempts.

The interlocutor added: “Unfortunately, even such simple settings on their resources are often overlooked by service owners.”

Passwordless authentication methods such as biometrics and hardware tokens have become popular, but a large number of login password pairs are available to criminals in already leaked databases or in new leaks.

“This is a truly dangerous time bomb for society, embedded in mass Internet communications. Unfortunately, even the most advanced expert in digital hygiene cannot protect against this threat,” Zolotukhin concluded. “An effective tool to combat such risks can only be the widespread mastery of the skills of working with cyber intelligence data by specialists and the widespread dissemination of systems of this type in all organizations that are truly interested in customer data.”

Recommended For You

The State Duma stated that Telegram cooperates with foreign intelligence agencies

February 20, 2026
The State Duma stated that Telegram cooperates with foreign intelligence agencies

Evgeny Popov, Deputy Chairman of the State Duma's Information Policy Committee, said that Russian authorities have data on voluntary cooperation in Telegram management with foreign intelligence agencies. About...

Read more

Traces of Tyrannosaurus rex attacking prey found in rare fossils

February 20, 2026
Traces of Tyrannosaurus rex attacking prey found in rare fossils

Fossils on display at the Museum of the Rockies in the US show a rare sighting of dinosaur predators. This is the skull of Edmontosaurus (a member of...

Read more

The Telegram press agency reported that there were no mail encryption hacks

February 19, 2026
The Telegram press agency reported that there were no mail encryption hacks

In particular, foreign intelligence agencies do not have access to them. This is how a representative of the service responded to Reuters' request. “The Russian authorities' claim that...

Read more

Google launched the Pixel 10a smartphone with an old design and last year's chip

February 19, 2026
Google launched the Pixel 10a smartphone with an old design and last year's chip

Google introduced the low-cost smartphone Pixel 10a, which is practically no different from its predecessor. Rozetked reported this. The smartphone is equipped with a 6.3-inch P-OLED display with...

Read more

Revealing how to protect iPhone from spam

February 19, 2026
Revealing how to protect iPhone from spam

Journalists from Macworld have shown how to rid your iPhone of information junk. Materials available at website media. First of all, experts advise blocking the most annoying callers...

Read more
Next Post
People know about the plans of EU countries to tighten procedures for moving diplomats from Russia

People know about the plans of EU countries to tighten procedures for moving diplomats from Russia

Related News

Warning from the Central Bank of Russia: Economy can stop at the end of the year

Warning from the Central Bank of Russia: Economy can stop at the end of the year

August 7, 2025
Sobyanin: Nearly 1.6 billion trips were made in six years on MCD

Sobyanin: Nearly 1.6 billion trips were made in six years on MCD

November 22, 2025

Sobyanin commented on the joke about the metro to St. Petersburg

December 4, 2025
News of the Northern Military District: more than 70% of Gulyai-Polye is under the control of the Russian Armed Forces

News of the Northern Military District: more than 70% of Gulyai-Polye is under the control of the Russian Armed Forces

December 24, 2025
Using reduced capacity

Using reduced capacity

August 26, 2025
In the project “Positive citizens” has updated the “pulse of the capital”

In the project “Positive citizens” has updated the “pulse of the capital”

July 24, 2025
Forecaster Leus: Temperatures in Moscow have returned to positive levels

Forecaster Leus: Temperatures in Moscow have returned to positive levels

December 17, 2025
Children were surprised at the “object from the space” in the school

Children were surprised at the “object from the space” in the school

September 2, 2025

Scientist Bogachev says the Sun will burn the Earth in 5 billion years

October 10, 2025
  • Politics
  • World
  • Investing
  • Finance
  • Technology
  • Health
  • Market
  • Press release

© 2025 Victoria Sun

No Result
View All Result
  • Home
  • Politics
  • Finance
  • Health
  • Investing
  • Market
  • Technology
  • World
  • Press release

© 2025 Victoria Sun

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?