60% of MD5 password hashes are crackable in under an hour

MD5 Password Hashes Now Crackable in Under an Hour: Why Your Logins Are at Risk

What was once considered a secure standard for password protection is now dangerously vulnerable. New research reveals that 60% of MD5 password hashes can be cracked in under an hour using a single high-end graphics processing unit (GPU), with nearly half crackable in under 60 seconds. This alarming finding, released on World Password Day, underscores why organizations and individuals must urgently move beyond MD5 hashing and adopt more robust security measures.

Cybersecurity researchers analyzed a dataset containing over 231 million unique passwords sourced from dark web leaks—including 38 million new entries since their previous study—to test how quickly modern hardware could crack MD5-hashed passwords. Using a single Nvidia RTX 5090 GPU, they found that attackers could crack three out of every five passwords in under 60 minutes, with nearly half yielding to brute-force attacks in under a minute. The study demonstrates that even high-performance hardware isn’t strictly necessary: attackers can rent cloud-based GPUs for just a few dollars to achieve similar results.

The vulnerability stems from two critical factors: the inherent weaknesses of the MD5 hashing algorithm and predictable password patterns. MD5, introduced in the 1990s, was never designed to be secure against modern computational power. Meanwhile, analysis of over 200 million exposed passwords revealed common patterns that attackers exploit to optimize cracking algorithms, drastically reducing the time needed to guess correct combinations. This combination of factors makes MD5 hashes particularly susceptible to large-scale breaches.

Why MD5 Has Become Obsolete

MD5 was once widely used because it was quick and simple, but its cryptographic weaknesses have been known for decades. The algorithm is designed for integrity checks, not security, and collisions (where different inputs produce the same hash) are common. When applied to passwords, this means attackers can reverse-engineer hashes far more efficiently than with stronger algorithms like bcrypt or Argon2.

The latest research builds on a 2024 study by the same team, which found that password cracking had become incrementally easier due to advancements in GPU technology. “Attackers owe this boost in speed to graphics processors, which grow more powerful every year,” explained the researchers. “Unfortunately, passwords remain as weak as ever.” The trend highlights a critical gap: while hardware improves, password security standards have largely stagnated.

Who Is Most at Risk?

Organizations that still rely on MD5 hashing—particularly those storing user credentials in plaintext databases or using outdated security protocols—face the highest risk. Even if passwords are hashed, MD5’s speed makes it trivial for attackers to reverse-engineer them after a data breach. Individuals are also vulnerable, as many websites and services continue to use MD5 or similar weak hashing methods without user knowledge.

The impact extends beyond direct breaches. Once attackers crack hashed passwords, they can:

  • Gain access to user accounts on multiple platforms (if the same password is reused)
  • Bypass security measures in systems that rely on password hashes for authentication
  • Launch credential-stuffing attacks against other services

The financial and reputational damage from such breaches can be severe, particularly for businesses handling sensitive customer data.

Expert Recommendations: Moving Beyond Passwords

Security experts agree that passwords alone are no longer sufficient. Chris Gunner, a Chief Information Security Officer (CISO) at a major managed service provider, emphasized that passwords should be just one layer in a broader security strategy. “Even a strong password can be undermined if the wider identity and access environment is not properly managed,” Gunner stated. He recommended pairing passwords with:

  • Multi-factor authentication (MFA), particularly biometric verification
  • Identity governance frameworks to monitor and restrict access
  • Endpoint protection to limit lateral movement after a breach
  • A zero-trust architecture to verify every access request
From Instagram — related to World Password Day, Expert Recommendations

Steven Furnell, a senior IEEE member and professor of cybersecurity at the University of Nottingham, echoed these concerns, noting that inconsistent adoption of modern security technologies leaves users exposed. “Many sites and services still don’t offer passkey support, forcing users into a mixed login experience,” Furnell explained. “While some argue it’s the user’s responsibility, they often lack guidance on how to create secure passwords—or even the option to use stronger methods.”

Furnell called on providers to take responsibility: “This World Password Day, the main message ought not to be to users, who often have no choice but to use passwords, but to the sites and providers requiring them.” He highlighted that many platforms fail to enforce adequate password requirements or educate users on modern security practices, leaving them vulnerable by default.

What You Can Do to Protect Yourself

While organizations bear primary responsibility for upgrading security infrastructure, individuals can take immediate steps to mitigate risks:

  • Enable MFA: Use apps like Google Authenticator, Authy, or hardware keys where available.
  • Avoid password reuse: Unique passwords for each account reduce the impact of breaches.
  • Use a password manager: Tools like Bitwarden, 1Password, or KeePass generate and store complex passwords securely.
  • Monitor for breaches: Services like Have I Been Pwned alert users if their credentials appear in leaks.
  • Push for better security: Advocate for passkeys, biometric authentication, and stronger hashing algorithms from service providers.
Alert: MD5 Password Crisis 2026 – 60% Cracked in an Hour

For organizations, the transition away from MD5 should be urgent. The National Institute of Standards and Technology (NIST) has long recommended against MD5 for password storage, and industry standards like PCI DSS also prohibit its use for sensitive data. Upgrading to algorithms like bcrypt, Argon2, or PBKDF2 adds computational overhead that slows down attackers significantly.

The Future of Authentication: Beyond Passwords

The rise of passkeys—passwordless authentication using public-key cryptography—offers a promising alternative. Supported by major platforms like Apple, Google, and Microsoft, passkeys eliminate the need for traditional passwords while providing stronger security. However, adoption remains uneven, with many services still requiring passwords as a fallback.

Until passkeys become universal, experts recommend a layered approach:

  • Phase out MD5 and SHA-1 hashing immediately
  • Adopt modern hashing algorithms with work factors (e.g., bcrypt with a cost factor of 12+)
  • Implement MFA by default for all accounts
  • Regularly audit third-party vendors for weak security practices

Key Takeaways

  • MD5 hashes are now crackable in under an hour using a single GPU, with nearly half yielding in under 60 seconds.
  • Password predictability exacerbates the problem, as attackers exploit common patterns to speed up brute-force attacks.
  • Organizations must upgrade from MD5 to stronger hashing algorithms like bcrypt or Argon2.
  • Multi-factor authentication (MFA) is critical to prevent account takeovers even if passwords are compromised.
  • Passkeys are the future but require widespread adoption to replace passwords entirely.

Next Steps: What’s Happening Now?

The cybersecurity community continues to push for industry-wide standards. NIST’s latest guidelines emphasize “memory-hard” functions to slow down attackers, while organizations like the FIDO Alliance promote passkey adoption. Meanwhile, cloud providers are expanding GPU rental options, making brute-force attacks more accessible to cybercriminals.

For individuals, the immediate priority is enabling MFA and using unique passwords. Organizations should prioritize:

  • Inventorying all systems using MD5 hashing
  • Migrating to modern algorithms with proper work factors
  • Training employees on secure password practices
  • Adopting a zero-trust security model

The message is clear: passwords alone are no longer enough. As World Password Day reminds us, it’s time to rethink our approach to authentication—before attackers exploit the remaining vulnerabilities. Have you experienced a breach or security incident due to weak password hashing? Share your story in the comments below, and let’s discuss how People can move toward a more secure digital future.

Leave a Comment