SpyCloud uses recaptured data from the dark web to analyze and identify the latest trends in cyber crime and its impact on society. Researchers found 723 breaches containing .gov emails in 2023, an increase from 695 in 2022 and 611 in 2021.
Researchers suggest the persistent problem may be at least in part due to password reuse — the practice of using the same password for multiple accounts. Password reuse rates for .gov users increased in the last year, from 61 percent in 2022 to 67 percent in 2023.
“In those instances, while we might not have a breach of a government system, if there is password reuse going on, that password from a compromised source could potentially be used against a government source, even if that government asset was not necessarily itself the victim of a breach,” said Hilligoss.
The increase in .gov passwords exposed on the dark web may also be due to the growing number of state and local government agencies adopting .gov domains.
“You could craft a password using only pop culture references that use four distinct words and special characters and spaces and from a cryptographic perspective, that’s uncrackable. But it’s not unguessable,” Hilligoss said. “Criminals are not dumb. They’re human beings just like everybody else. They’re thinking people, so they know what the password trends are. This is not news to them.”
As conversations continue within tech communities about whether the password should die, SpyCloud researchers suggest that at minimum, users consider using password managers to protect their accounts from cyber attacks.