Skip to main content

Wag the password: Public sector suffers from password exposure

Man with glasses looks at computer with code reflected on his face.

How well do governments handle password security?

For years, NordPass has analyzed exposed passwords belonging to businesses and individuals. For the first time, in 2025, we looked at the passwords used by public sector employees.

Leaks and breaches in the public sector are particularly dangerous. They don’t affect just the organization or its employees but can threaten the security of citizens at large.

Cybersecurity incidents related to public sector passwords may also pose a serious risk to a country’s strategic interests.

Research breakdown

Methodology

Threat exposure management platform NordStellar monitored passwords from public sector institutions in the United States, the United Kingdom, Canada, France, Italy, and Germany, based on their email domains.

5,500 organizations

The research covers over 5,500 organizations in six countries, monitoring national and federal parliaments, presidencies, local and regional governments, municipalities, and other public institutions.

Data exploitation

The analysis covered credentials exposed in 2024-2025 to account for recency, password relevance, and potential use to access civil servants’ accounts.

Overview of data exposure in the public sector

Based on the findings, thousands of data points belonging to public sector employees in six countries, including email addresses, first and last names, phone numbers, and other personally identifiable information, have been exposed since the beginning of 2024.

CountryNumber of exposed passwordsNumber of unique exposed passwords
United States53,0702,241
France19,5381,805
Italy13,6131,502
United Kingdom3,014434
Germany1,365150
Canada50677
Shield icon with a lightning bolt and text showing 91K account

Among all exposed data points, we identified over 91 thousand passwords matching email addresses with relevant public sector domains.

If affected passwords weren’t updated following the related incidents and multi-factor authentication wasn’t switched on, attackers could have potentially accessed these accounts and other sensitive information, creating serious data security risks.

Even in instances where a password didn’t match an email address, other exposed data points could be exploited for phishing attacks.

Risks lurk at every governing level

Our findings have debunked the common misconception that national and federal institutions are better protected against cybersecurity threats and that local public sector organizations are more susceptible to attacks.

Although the majority of exposed credentials were traced back to regional and municipality level institutions like administrations and local governments, the national and federal government weren’t spared by cybercriminals either.

Passwords and other personally identifiable data can be stolen even without causing major breaches or exploiting organizational vulnerabilities. Cybercriminals can exploit social engineering attacks against individual employees or breach other organizations that handle data related to public sector institutions.

Nameunique / total passwords
U.S. Department of Defense (mail.mil)222 / 1897
U.S. Department of State (state.gov)190 / 15272
U.S. Army (army.mil)167 / 1706
Government of the District of Columbia (dc.gov)57 / 562
U.S. Department of Veterans Affairs (va.gov)53 / 1331
City of Virginia Beach (vbgov.com)46/ 318
Government of Illinois (illinois.gov)38 /879
U.S. Coast Guard (uscg.mil)27 /393
Government of Utah (utah.gov)25 / 514
Government of Michigan (michigan.gov)23 / 3161

Exposure threatens national institutions

A shield with a lightning bolt icon is overlaid on a grayscale building with columns.

Our analysis focused particularly on passwords used by employees at the national and federal levels — parliaments, governments, ministries, departments, and presidential administrations — across six countries.

The findings are alarming: Even employees working at these critical national institutions can be impacted by password exposure, as seven compromised passwords were linked directly to the White House.

Findings

Institution
Total number of exposed passwords
Loading

Key takeaways

Although over 91 thousand exposed passwords were found during the research period, the real number of compromised credentials may far exceed that. Cybercriminals don’t share or sell their loot right away — it may take months or even years for a password compromised today to show up on the dark web or illicit marketplaces.

Man looking at a computer screen with "91K accounts" text overlay.

 Best tips for password safety

Avoid falling victim to cyberattacks due to irresponsible credential management by following the best password management practices recommended by cybersecurity experts at NordPass.

Use strong passwords or passphrases

We recommend using passwords that are at least eight characters long and include a random mix of upper- and lowercase letters, numbers, and special symbols. Similarly, consider using passphrases — a long string of random words that only you know and use to authenticate your identity.

laptop password generator

 Never reuse passwords

The key rule to account security is using unique passwords for every account. If you reuse the same password for multiple accounts and one of them gets breached, the rest of your accounts with the same login credentials will be at risk of being compromised too.

man with passwords visual

Set up a password policy for your organization

Create a centralized standard for every employee to help safeguard employee accounts and sensitive data. With a password manager, companies can effectively manage credentials by setting up rules within the organization or specific departments. Some password managers like NordPass include additional security features like Data Breach Scanner and Password Health to alert employees if their data is vulnerable or breached.

password policy

Turn on multi-factor authentication (MFA)

Add an extra layer of security to your organization’s accounts. Multi-factor authentication helps maintain more secure access to internal systems and email accounts, keeping cybercriminals out even if a password gets breached.

Woman at a desk using a laptop, with a phone screen showing a two-factor authentication code.