France 2025: The surprising ranking of the 20 weakest passwords – the cybersecurity blooper reel

Julien

December 8, 2025

découvrez le palmarès étonnant des 20 mots de passe les plus faibles en france en 2025, un bêtisier incontournable pour mieux comprendre les erreurs fréquentes en cybersécurité et protéger vos données.

In 2025, cybersecurity in France faces a reality as perplexing as it is worrying: the passwords used by internet users remain astonishingly weak. The latest ranking established by NordPass reveals that despite the increase in cyberattacks, the French do not abandon their bad habits regarding IT security. Simple words like “admin,” “123456,” or “password” unfortunately remain at the top of the lists of most chosen passwords. The security blooper reel thus continues to grow, highlighting the glaring vulnerability of millions of users. This normalization of risk raises an essential question: what to do in the face of this persistence of weak passwords that jeopardize the protection of individual and professional data?

At a time when one in two data breaches is attributed to insufficient access security, understanding this issue and its dynamics is more necessary than ever. Through this article, we will explore the ins and outs of this situation, the psychological and technical reasons explaining this persistent choice of passwords that are both simple and ineffective, and possible solutions to break this vicious cycle. Because cybersecurity, far from being a boring obligation, is a matter of trust, comfort, and shared responsibility.

France 2025: the ranking of weak passwords defying cybersecurity

The annual NordPass report has shed light on what many suspected but often refuse to admit: in France, in 2025, the choice of passwords remains overwhelmingly in the very weak zone. Among the top 20 most used passwords, “admin” sits at the top, followed by the classic “123456,” then “password.” These simplistic and popular choices reflect a historical negligence towards IT security.

But this ranking is not limited to universal terms. The French also show local specificities in their choices, such as “azerty,” a mirror of the traditional keyboard, or unexpected words like “poisson” (fish) and “gazeuses” (soft drinks), which are ultimately part of a common lexicon rather than a thoughtful data protection strategy. This highlights a tendency to favor memorability at the expense of strength.

This continuity in weak passwords is also explained by a often mistaken perception of the threat. For many, increased complexity means discomfort and forgetfulness, which leads to excessive reuse of the same words or extreme simplicity. Yet, 80% of data breaches would be directly linked to this weakness in protections.

PositionPasswordOrigin / ParticularityAssociated IT Risks
1adminDefault administration wordImmediate access to sensitive accounts
2123456Simple series of numbersEasy and automated decryption
3passwordGeneric English wordsExposed to dictionary attacks
4azertyFrench keyboardPredictable by geolocation
5poissonCommon term, simple wordVulnerable to targeted attacks
6gazeusesEveryday wordLow robustness

This table gives a precise idea of the major flaws in password management. It is obvious that this trend can only increase the risks of cyberattacks against both individuals and companies.

discover the surprising ranking of the 20 weakest passwords in France in 2025, an essential blooper reel to understand common cybersecurity mistakes and better protect your data.

Why so much password vulnerability persists

Several psychological and practical reasons explain why users do not change their habits. First, the comfort provided by a simple password: easy to memorize, to type quickly, and unlikely to cause a lockout in case of forgetfulness. Then, the lack of knowledge or denial of the actual seriousness of the risks involved. Awareness campaigns, although numerous, struggle to sustainably change behavior, especially if technology does not promote the adoption of strong solutions like password managers.

  • Fear of forgetting leading to choosing a simple word
  • Illegitimate reuse of the same words across multiple accounts
  • Use of familiar or cultural words to maintain memorability
  • Wrong assumption that a few symbols are enough to secure
  • Difficulty using tools to manage complex passwords

The vicious circle is thus complete. To break this chain, a joint effort from users, site designers, and competent authorities is needed through better ergonomics, targeted awareness, and strengthened minimum requirements.

Young and elderly: same mistakes, same carelessness regarding weak passwords

A surprising observation reinforces this security blooper reel: indifference to IT risks knows no generation. 18-year-olds show practices identical to those of 80-year-olds. Karolis Arbaciauskas, expert at NordPass, points out that password habits are extremely similar, even if millennials and Generation Z sometimes introduce terms from popular culture or local slang.

This generational homogeneity in password weakness is partly explained by social and educational behaviors. The lack of in-depth cybersecurity training in schools and professional environments creates fertile ground for negligence.

  • Frequent use of simple or repeated numeric sequences
  • Popular cultural references as substitutes for strong words
  • Lack of real integration of cybersecurity in curricula
  • Casual attitude towards online account protection
  • General absence of automated tools usage to strengthen security

A detailed analysis of behavior also reveals that this phenomenon is not only cultural but also technological: the absence of strong validation mechanisms on certain services encourages even greater laxity.

Age rangePreferred types of passwordsCommon examplesImpact on data protection
18-30 yearsSlang, cultural references, easy numberscool, 1234, freestyleLow protection, increased risk
60 years and overNumeric sequences and simple everyday wordspassword, 1111, totoExposure to cyberattacks

What are the real IT risks linked to weak passwords?

Facing this cybersecurity blooper reel represented by the persistence of weak passwords in France 2025, it is crucial to understand the real risks involved. A weak password often constitutes the first vulnerability exploited by hackers during a cyberattack. In 80% of cases, data breaches are attributed to reuse or weakness of passwords.

The consequences are not only financial. They also affect privacy, trust in digital environments, as well as service availability. Hacking an email or bank account, compromising sensitive personal data, spreading ransomware, or identity theft are all threats incurred.

  • Theft of sensitive personal information
  • Hijacking of bank or professional accounts
  • Damage to digital reputation
  • Spread of malware and ransomware
  • Risks of compromise of confidential company data

The weakness of passwords facilitates hackers’ work who have increasingly sophisticated tools to break these protections. It should also be noted that some so-called “complex” fake passwords (for example, admin@123) are easily detected and bypassed by hacker algorithms.

Risk typeDescriptionConcrete example
Data theftUnauthorized access to private informationCustomer data leak from a company
Identity theftFraudulent use to deceive a third partyCreation of fake profiles on social networks
Financial impactLoss of money following bank hackingTheft from an online bank account
RansomwareAccess blocking of data against ransomTargeted attack on a hospital or SME

How to progress in the face of the threat: advice and best practices against weak passwords

The fight against weak passwords is an absolute priority to strengthen individual and collective cybersecurity. Several methods can improve data protection while limiting user frustration.

Firstly, the systematic adoption of password managers is essential. These tools generate complex and unique alphanumeric strings for each account. They also offer centralization and secure backup of access credentials.

Furthermore, implementing multifactor authentication (MFA) becomes essential. Adding a second factor, whether a smartphone, a physical key, or biometrics, greatly complicates the hacker’s task who manages to obtain a weak password.

  • Use of a recognized password manager
  • Creation of long and unique passwords (minimum 12 characters)
  • Activation of two-factor or multifactor authentication
  • Never reuse the same password on different services
  • Regularly update passwords and their associations

Finally, continuous awareness, notably in schools, companies, and for the general public, is an indispensable lever to change mindsets. Developers and administrators must also integrate minimum robustness requirements from the design stage to prevent the creation of overly weak passwords.

SolutionAdvantagesLimits
Password managerSimplifies generation and memorizationLearning required and trust in the tool
Multifactor authenticationEnhanced protection through second factorCan be cumbersome or sometimes unavailable
Regular password changesReduces accumulation risksUser fatigue, risk of errors
discover the surprising ranking of the 20 weakest passwords in France in 2025 – a cybersecurity blooper reel highlighting common mistakes to avoid to protect your data.

The security blooper reel: the most unusual and surprising passwords in France 2025

The NordPass ranking did not only deliver a list of weak passwords; it also revealed surprisingly original choices that contribute to this great cybersecurity blooper reel. Beyond the classics, there is a range of unusual terms, often inspired by everyday objects, food, or cultural references.

Among these curiosities, “poisson” (fish) or “gazeuses” (soft drinks) surprise by their unexpected appearance. The fact that such trivial terms appear in the top 20 clearly shows the absence of a coherent strategy in access protection. These words are easy to remember but just as easy to guess, especially when linked to language and local culture. This trend illustrates that risk does not always rhyme with complexity, but often with excessive familiarity.

  • Everyday terms such as “poisson”
  • Words related to food or drinks
  • French linguistic references, for example “azerty”
  • Whimsical choices without security concerns
  • Common patterns despite apparent diversity

This phenomenon urges reflection on cybersecurity education: how to convince users to go beyond their comfort zone to adopt truly securing habits? It is a major challenge for 2025. The persistence of these easily replaceable words must be a warning signal for all data protection stakeholders.

PasswordOriginWhy it’s risky
poissonCommon, simple nameToo easy to guess, especially in France
gazeusesCommon wordLack of complexity, predictable
chocolatPopular foodOften in dictionaries used by hackers
azertyKeyboard layoutEasy to guess through geolocation
bonjourSimple expressionVulnerable password
discover the surprising ranking of the 20 weakest passwords in France in 2025 and dive into the cybersecurity blooper reel to effectively protect your data.