Sports Fans Beware: Passwords Might Be Putting You at Risk

0
28

Sports Fans Beware: Passwords Might Be Putting You at Risk

Tech innovation experts at GlobalDots analyzed over 180 NFL-related password variations to reveal the most frequently compromised in data leaks.

With searches for “any password ideas” up 143% over the past year, many may turn to familiar names like their favorite sports teams for password inspiration – but new data shows it could be making people more vulnerable to being hacked.

The study reveals the top 5 most hackable NFL team-related passwords:

  1. Dallas Cowboys – 185,842 breaches
  2. Las Vegas Raiders – 185,665
  3. Pittsburgh Steelers – 146,351
  4. Philadelphia Eagles – 122,989
  5. Green Bay Packers – 92,050

Additional information: https://www.globaldots.com/resources/blog/most-hackable-sports-passwords/

Passwords Relating to Dallas Cowboys, Raiders, and Steelers Revealed as Most Hackable

  • A new study has revealed the most frequently leaked NFL related passwords.
  • Passwords relating to Dallas Cowboys, Raiders, and Steelers are most likely to appear in data leaks.

Thinking of unique password ideas can be frustrating, in fact searches for “any password ideas” have seen a 143% increase in the last 12 months1, and although your favourite sports team may seem like a go-to, a new study has revealed that many have appeared in thousands of data leaks.

The study, from tech innovation experts, GlobalDots, has looked to uncover the sports-related passwords that have appeared in the most data leaks and are, therefore, more vulnerable to being hacked. The data analysed various password iterations relating to NFL teams, and ranked them based on the ones that had been compromised in the most data breaches, using a pwned password tool.

Most Hackable NFL Passwords:

Across the NFL, passwords relating to the Dallas Cowboys, Las Vegas Raiders and Pittsburgh Steelers have appeared in the most data leaks. Dallas Cowboy related passwords have appeared in 185,842 data leaks, with passwords relating to the Raiders appearing in 185,665 data leaks, and for the Steelers, 145,000+ data leaks for related passwords.

The NFL teams most likely to have related passwords appear in data leaks were:

Rank Team State Total Password Leaks
1 Dallas Cowboys Texas 185,842
2 Las Vegas Raiders Nevada 185,665
3 Pittsburgh Steelers Pennsylvania 146,351
4 Philadelphia Eagles Pennsylvania 122,989
5 Green Bay Packers Wisconsin 92,050
6 Denver Broncos Colorado 80,723
7 Carolina Panthers North Carolina 69,706
8 Miami Dolphins Florida 69,613
9 Minnesota Vikings Minnesota 68,451
10 New England Patriots Massachusetts 62,380
11 Chicago Bears Illinois 54,921
12 Los Angeles Chargers California 52,092
13 Atlanta Falcons Georgia 49,549
14 New York Giants New Jersey 45,812
15 New Orleans Saints Louisiana 44,871
16 Arizona Cardinals Arizona 40,000
17 Detroit Lions Michigan 31,830
18 Tennessee Titans Tennessee 30,300
19 Seattle Seahawks Washington 29,752
20 Indianapolis Colts Indiana 27,753
21 Cincinnati Bengals Ohio 25,170
22 San Francisco 49ers California 24,183
23 Baltimore Ravens Maryland 22,788
24 Cleveland Browns Ohio 22,190
25 Kansas City Chiefs Missouri 15,960
26 Jacksonville Jaguars Florida 15,362
27 Buffalo Bills New York 13,781
28 Houston Texans Texas 8,729
29 Los Angeles Rams California 8,207
30 New York Jets New Jersey 7,883
31 Tampa Bay Buccaneers Florida 1,265
32 Washington Commanders Maryland 25

A spokesperson for Globaldots comments on the importance of strong passwords, “If there’s a chance you’ve used any of these teams in your own personal collection of passwords, then this may be the sign you need to look to update your password security.

“Using weak passwords across multiple platforms could compromise your web security, this includes everything from your private and business cloud data, payment processing accounts, amongst the likes of social media accounts. Using your favourite sports team as a password isn’t as obvious as the likes of ‘1234567’, but it still poses risks with sports being a commonality between many people’s interests.

“When setting a strong password you should avoid using common words or phrases, including personal information. You should be making sure that your password is at least 12 characters long, is made up of random words or phrases, such as looking around your room and choosing three items that you see first, and should include a mixture of upper and lower case characters, numbers, and symbols. Where possible, passwordless authentication, which uses biometric verification to log into an account, should be used as this can mitigate the risk of password leaks. All of these steps form just one essential part in ensuring your web security solutions are strong enough to manage any potential cyber-attacks.”

The full study can be found here: [link when live]

ENDS

Sources:

  • Keywordtool.io correct as of 28th March 2025

Methodology:

This dataset ranks 186 sports teams, based on how vulnerable the passwords are which include the team names. To do this, 23 different password variations were used (11 for UK). Once the data for the password variations was collected, the different variations for each team were summed, to provide each team a total number of password leaks. The teams were then ranked from highest to lowest, based on the number of leaks. Number of password leaks were taken from: https://haveibeenpwned.com/

The password variations used are as follows (example using Buffalo Bills):

  • BuffaloBills
  • BuffaloBills1
  • BuffaloBills123
  • BuffaloBills!
  • BuffaloBills123!
  • buffalobills
  • buffalobills1
  • buffalobills123
  • buffalobills!
  • buffalobills123!
  • Buff@l0B1lls

To ensure American teams get a representative value, we also used prompts using only the team’s nickname i.e. Bills instead of Buffalo Bills, these additional prompts are as follows (Not applicable for UK & MLS teams):

  • Bills1
  • bills1
  • Bills123
  • bills123
  • Bills!
  • bills!
  • Bills123!
  • bills123!
  • BillsFan
  • billsfan
  • GoBills
  • Gobills

All data is correct as of 11/03/25. The ranking data shown is a compilation of multiple data sources and may not be representitive of real life. All data is accurate with regards to the sources provided.

About GlobalDots:

For over 20 years, GlobalDots has been on a mission to introduce new, cutting-edge cloud solutions to businesses worldwide. Fusing an insatiable hunger for innovation with a diligent team of hands-on experts, we help our customers thrive in a quickly-changing world.

***************************************

Know some top athletic performances? Seeing some great teams in action?

We can use your help, and it’s simple.  Witness some great performances? Hear about top athletes and top teams in our area?

Athlete of the Week and Team of the Week:

Nominate an athlete or team: HERE

**********************************************

Pancakes or Waffles!  We feature top area athletes with our world-renowned feature. Send us your nominations for who you’d like us to interview HERE

College Athlete Roundup! We want to recognize student-athletes from the area who are competing at the college level. Send us information on college athletes from the area with our simple form HERE

Where are they Now? We feature athletes and difference makers from the past, standouts in sports who excelled over the years and have moved on. Know of a former athlete, coach, or difference maker who we should feature? Know of a former standout competitor whose journey beyond central Wisconsin sports is one we should share? Send us information on athletes and difference makers of the past with our simple formHERE

Baked or Fried! We also feature difference makers throughout central Wisconsin: coaches, booster club leaders, administration, volunteers, you name it. Send us your nominations for who you’d like us to interview HERE

We welcome your stories! Contact us at news@onfocus.news!

David Keech
Author: David Keech

David Keech is a retired teacher and works as a sportswriter, sports official and as an educational consultant. He has reported on amateur sports since 2011, known as 'KeechDaVoice.' David can be reached at keechertheteacher@gmail.com