Skip to main content

Insights from Enzoic’s AD Lite Data

Compromised user credentials are a major security threat for organizations, as the 2025 Verizon DBIR reported that credential abuse was the leading initial access vector for data breaches. Recent data from Enzoic’s Active Directory Lite (AD Lite) tool indicates that the risk of compromised credentials is growing. Analysis of aggregated AD Lite scan results for 2024 and 2025 shows credential-related risk becoming more pronounced across organizations. Not necessarily because users are choosing worse passwords year over year, but because the volume of exposed credentials is rising sharply as data breaches continue to accelerate. In other words, even when users keep the same passwords, they are increasingly likely to become compromised as breach datasets expand.

Shortcomings like weak passwords, password reuse, and inactive (“stale”) accounts are contributing to a larger share of users being vulnerable to account compromise.

In 2025, AD Lite domain scans averaged 1,014 users. While some environments were substantially larger or smaller, the average compromised-password rate was about 19% (196 compromised-password users out of 1,014 users per domain, on average), illustrating that exposure remains significant across organizations of many different sizes.

AD Lite Data Shows the Risk of Compromised Credentials is Rising

AD Lite 2025

Figure: Chart showing the increase in compromised and unsafe credentials from 2024 to 2025 based on Enzoic’s AD Lite aggregated data. In 2025, a larger portion of accounts had compromised or weak passwords compared to 2024, indicating a growing risk.

As shown above, the prevalence of compromised credentials increased from 2024 to 2025. In 2025, roughly 19% of user accounts scanned by Enzoic’s AD Lite were found to have passwords that had been compromised (exposed in data breaches), up from about 14% in 2024. This uptick of over five percentage points means a greater fraction of users are using passwords that attackers already know. In fact, accounts with unsafe passwords (meaning either compromised or weak) crossed the one-in-five mark in 2025, reaching about 22% of accounts per domain (versus ~15% in 2024).

Weak Passwords Further Increase the Risk of Compromised Credentials

Compromised passwords are only part of the problem. Many users continue to choose weak, easily guessable passwords, which are highly susceptible to dictionary-based guessing attacks, including offline dictionary attacks if password hashes are ever exposed, and this further adds to the risk of compromised credentials. The AD Lite data shows that the proportion of users with weak passwords (such as “!!!!!!!!” or other common choices) increased significantly from 2024 to 2025. While only about 1.6% of accounts scanned in 2024 used passwords deemed weak, that share jumped to roughly 2.7% in 2025. This is a worrisome increase in poor password hygiene. Even though a weak password hasn’t been leaked in a breach yet, an attacker can guess or crack it with minimal effort. Or, if the hash becomes leaked in a breach, it will be easier to recover the original password.

By combining the figures for compromised and weak passwords, we see that over 22% of all accounts in 2025 had unsafe credentials (either already compromised, or so weak that they’re effectively insecure).

This means more than one in five users had a password that put their account at high risk.

The growth in unsafe-password incidence from 2024 to 2025 indicates that organizations are facing an increasing threat. In short, not only are breached passwords more common, but users’ propensity to set weak passwords has also increased, which creates a larger attack surface. The risk of compromised credentials is amplified when users rely on passwords that attackers can easily obtain or guess.

This mirrors what Verizon sees across real-world incidents: the 2025 Verizon DBIR found that attackers using stolen/compromised credentials is the top initial access vector in breaches. This industry context helps explain why credential abuse continues to show up as one of the most common ways attackers get in, and why reducing unsafe passwords directly reduces breach likelihood.

Addressing the Risk of Compromised Credentials

The upward trend in compromised credentials and related weaknesses is a clear call to action for IT security teams. Fortunately, the same data that highlights these risks can also inform solutions. Enzoic’s AD Lite scan provides valuable visibility into where your Active Directory stands by helping you see your current level of risk and identify exposed or weak passwords. But for a long-term fix, organizations need more than periodic snapshots. That’s where Enzoic for Active Directory comes in, which delivers continuous monitoring, ongoing visibility, and set-and-forget protection that keeps your environment secured as conditions change.

To mitigate the risk of compromised credentials, consider the following steps:

  • Start by benchmarking risk with AD Lite: Use Enzoic’s AD Lite to scan your Active Directory for passwords that appear in breach datasets or common password lists. This gives you a clear picture of your current exposure and where remediation should be prioritized.
  • Enforce strong, unique passwords at scale: Strong password policies are important, but enforcement is where most programs break down. With the full Enzoic for Active Directory solution, you can set secure passwords while continuously identifying weak or compromised passwords and drive remediation so that strong, unique password use becomes consistent across the organization and not just after a one-time scan.
  • Maintain continuous visibility into high-risk account conditions: Misconfigurations and account hygiene issues can quietly increase risk over time. The full product provides always-on visibility into issues like accounts with no credentials set, expired credentials, and stale/inactive accounts, so you can address problems before they become entry points.
  • Move from visibility to set-and-forget protection with Enzoic for Active Directory: AD Lite shows you where you stand today, but Enzoic for Active Directory is the long-term solution. It combines continuous monitoring with automated remediation workflows so issues are addressed as soon as they’re detected. Instead of periodic checks and manual cleanup, you get set-and-forget protection that helps keep your Active Directory continuously secure with far less operational overhead.

The data from Enzoic’s AD Lite tool makes it evident that the risk of compromised credentials is increasing and cannot be ignored. More broadly, it reinforces a key point: scanning and fixing passwords once is not enough. Because new breaches and exposures happen continuously, truly proactive protection demands ongoing monitoring and repeated remediation to keep the risk of compromised credentials from creeping back up over time. From 2024 to 2025, organizations saw higher proportions of their user accounts flagged for compromised or unsafe passwords, driven by factors like weak password choices, reuse of credentials, and poor account hygiene. The silver lining is that with awareness comes the ability to act. By heeding these insights (tightening password policies, cleaning up old accounts, and continuously monitoring for credential exposure), organizations can reduce their risk. The fight against compromised credentials is an ongoing effort, but it’s one that IT teams can get ahead of by using the right tools (such as Enzoic for Active Directory) and best practices to keep their users and data safe.

 

AUTHOR


Josh Parsons

Josh is the Product Manager at Enzoic, where he leads the development and execution of strategies to bring innovative threat intelligence solutions to market. Outside of work, he can be found at the nearest bookstore or exploring the city’s local coffee scene.