How to Recover your Lost Blockchain.com Password

How to Recover your Lost Blockchain.com Password

Blockchain.com was founded in mid 2011 as Blockchain.info, and released its Bitcoin wallet on Dec 1, 2011.  The Blockchain wallet has many accolades:

  • It is commonly named to top-5 and top-10 lists of top cryptocurrency wallets,
  • As of December 2022 its users have created more than 85 million wallets.
  • It claims to be the “#1 digital wallet” for cryptocurrency.

The Blockchain wallet is what is known as a “hybrid” wallet. This means that the company stores an encrypted version of your wallet’s private key on their servers, but it does not store your password.  This provides a number of benefits:

  • Convenience: you can access your wallet anywhere you can get an internet connection.
  • Continuity: you don’t have to worry if your laptop dies — Blockchain.info still has your wallet.
  • Security: even if hackers access the company’s servers they can’t steal your password (and your coins) because they aren’t stored there.

However, there is one major drawback: if you lose your password (and you have not written down your 12-word wallet recovery phrase) the company cannot retrieve or reset your password for you.

As Blockchain.info says: “Unfortunately, we’re unable to help you re-gain access to your wallet if you’ve lost or forgotten your password. This is because we don’t have access to your wallet or your wallet password.”

However, CryptoAssetRecover.com can help you recover your password.  This article documents a process you can use that may allow you to recover your password yourself.  However, our clients often reach a point where they need professional help.

Quick Note on When Blockchain was Founded

While it is widely believed that Blockchain.info was founded in August 2011, it looks like the service was first announced on Aug 30, 2011. You can see the thread announcing the service on BitcoinTalk.org, here. However, Blockchain.info was initially founded as a block explorer and blockchain analytics website. The Blockchain wallet was launched in Beta on Dec 1, 2011, and you can see that announcement here.

How to Find your Wallet ID

A Blockchain Wallet ID is simply a username for your Blockchain account.  (It is not a blockchain public address or private key).

A Wallet ID is made up of 32 alphanumeric characters and 4 dashes.  It takes the following format:

xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx

Blockchain.com has an article that may answer more questions titled: What is a wallet ID?

The simplest way to find your Wallet ID is through your email account.  Blockchain lets you link an email address to your account so that they can send notifications when something changes.

Take a moment to write down all the email addresses that you might have linked to your Blockchain wallet.

  • Search each email account for a message with the subject line: “Welcome to My Wallet”.  If you find it, that message will contain your Wallet ID.
  • If that doesn’t work, you can take the following steps:
  • Open your web browser and go to: https://login.blockchain.com/#/login?product=wallet
  • It’s possible, but unlikely that your wallet id will be displayed in the “Wallet ID” field of the login form
  • Enter the email address you used to create the wallet in the “Your Email or Wallet ID” field, and click “Continue”
  • If the email address you entered is associated with one or more wallets, then Blockchain will email you the Wallet ID or IDs within a few minutes.

Once you find your Wallet ID, you’re ready to move on to making your password guesses.

How to Guess your Blockchain Password

Creating a good list of password guesses requires time and research.  We’ll start by explaining the minimum password requirements, then move into techniques you can use to jog your memory.  Your goal at this point is to cast a wide net:  what is the entire set of password components (also called “tokens”) that you might have used to create your password.

Blockchain Password Requirements

As of January of 2018, Blockchain.info enforces the following requirements on new accounts:

  • Passwords must be at least 10 characters long
  • Certain strings (“1234567890”, “abcdefghij”, the same letter repeated 10 times) are not allowed

This appears to be largely the same set of criteria that the company required in January of 2012, when they wrote: “We require a password of at least 10 characters in length to ensure that even if our database is compromised your wallet will remain secure.”

At the risk of stating the obvious, this means that whatever password you chose for your Blockchain wallet is at least 10 characters long.

Update: However, in February of 2021 we discovered a 2017 Blockchain password that was only 9 characters long.  So, if your Blockchain password was created earlier than January of 2018, a shorter password length is possible.

How People Typically Create Passwords

Most people have weaknesses in the way that they create and use passwords:

  • They re-use the same passwords on multiple websites.
  • Even when they use different passwords on different websites, they often re-use components of those passwords from site to site.
  • When people use numbers they tend to put those numbers at the end of their passwords.

While this is typically interpreted as a problem, in our case it’s a benefit.  If you’re like most people there’s a good chance that your Blockchain.info password is related to some of the other passwords that you have.  One strategy for making a good password guess: look at the other passwords that you have created, and look for common patterns.

  • Do you use the same strings (such as names of family members, sports teams, etc)
  • Do you use the same numbers (years, single digits, double digits, etc)
  • Do you use the same special characters (the tilde “~” or the hash “#”, for example)

Use your Browser Password Manager for Inspiration

One common source of inspiration is your web browser’s password manager.  This is the tool that asks you if you want your browser to remember your password when you create an account on a new website.

Here are instructions for opening your password manager on the most widely used web browsers:

You want to do two things:

  • Write down each password down.
  • Look for common patterns in how you created those passwords.
  • What “tokens” do you commonly re-use?
  • Where do you capitalize letters?
  • Where do you place numbers?
  • What special characters do you use?

Create a Testing Plan

Once you have identified possible keywords and your own password creation patterns, it’s time to create a plan for how to proceed.  Basically, you want to create a long list of passwords and password variations that you can systematically use to try to login to your Blockchain.info account, one after the other.

In many ways, an offline spreadsheet created in Microsoft Excel, Apple Numbers, OpenOffice, or a similar program is the perfect tool for this job.  You can put each password in a new row, copy and paste the password from the spreadsheet to the Blockchain.info login form (rather than risking typos as you manually type each password), and record which passwords you have tried and which you haven’t.

The downside of using a spreadsheet is that you have now created a single file which contains the passwords for all of your accounts.  If you were to lose your computer (or get hacked) this would create a serious potential security risk.  If you use a spreadsheet (rather than pencil and paper) take the following precautions:

  • Switch from using your browser’s password manager to a secure password manager like LastPass.  Change all your passwords now.
  • Set a reminder in your calendar to delete the file in a week.
  • Save the spreadsheet to your desktop so that you won’t forget about it.
  • Make sure to delete the spreadsheet when you’re done.

What to Put in your Spreadsheet

Your spreadsheet needs to have two columns:

  • Guesses
  • Status

Start by copying and pasting your passwords from other services into the spreadsheet.  To get a feel for how the process works, point your web browser to the Blockchain.info login page: https://blockchain.info/wallet/#/login

Copy and paste your Wallet ID into the “Wallet ID” field

Copy and paste your first password guess in the “Password” field

Click the “LOG IN” button

If that first password doesn’t work, enter “Checked” in the “Status” column of your spreadsheet and move on to the second password.  Rinse and repeat.

Creating Permutations of your Password Tokens

Assuming that you have not already cracked your password, now you want to start creating combinations of the “tokens” that seem reasonable.  This is known as “brute force” decrypting a password.  The basic strategy is to take a set of known tokens that may be part of the password and create hundreds (or thousands or millions) of permutations of those tokens, and test them until you find the right one that unlocks your cryptocurrency.

When you’re doing this manually, you get to decide how many combinations you want to try.  If you work with a company that does this at scale, we will typically try tens of millions of combinations if necessary to decrypt your password.

Before you start, consider the following questions:

Do you use the same numbers repeatedly in multiple passwords?  If so, perhaps you append those same numbers to whatever passwords don’t have them.

Do you use the same special characters repeatedly in multiple passwords?  Those are good tokens to add to the passwords that don’t have them.

I would recommend that you find a pattern in your set of passwords, and that you create new “batches” of about 25 passwords at a time in your spreadsheet.  Once you have created a batch, go test them.  Then, find a new pattern to test, create a batch of passwords and test them.

If you find your password using this approach, then congratulations!  Your methodical persistence has paid off!  You converted a small amount of your time into (hopefully) a substantial payday.  You should now:

  • Create the 12 word recovery phrase for your Blockchain account, write it down, and store it somewhere safe.
  • Delete the spreadsheet with all your password guesses

If you reach a point where you’re running out of new ideas to test, or you have simply exhausted your patience, don’t despair.  This process of brute-forcing a password is our bread and butter.  We’re happy to take your password guesses and make tens of millions of attempts to recover your wallet.

Contact us.


Get Help From Our Experts

Click the button below to get started.

Frequently Asked Questions

What is cyber security?

Cyber security is a term used to describe the protection of electronic and computer networks, programs and data against unauthorized access. Maintaining a high standard of security is essential to protect critical systems and data against cyber-attacks. The sophistication, persistence and continuous evolution of cyber threats means organizations are finding it increasingly challenging to defend against them. This makes it essential to approach cyber security as a continuous journey, involving regular assessments and appropriate investment in people, processes and technologies to mitigate the risk.

What are cyber security services?

Cyber security services are specialized engagements designed to enable organizations to manage and mitigate the risk and impact of cyberattacks. Kroll’s cyber security services are designed to help organizations protect, detect and respond. The right mix of cyber security services, including advisory services, proactive assessments, managed detection and response, incident response and breach notification, ensures that organizations are able to defend against threats on endpoints, across the surface web and throughout the deep and dark web.

What are the 3 pillars of information security?

Infosec, or information security, forms a critical part of cyber security because it helps to protect online data from authorized access or use. The three pillars of infosec, Confidentiality, Integrity and Availability, often referred to as the CIA triad, are foundational principles for maintaining a robust level of security. Confidentiality involves checking whether your systems are protected from external, authorized access. Integrity entails ensuring that data has not been tampered with and is correct and trustworthy, while availability involves checking that networks, systems and applications are operational and ready for use when required.

Where to start with cyber security?

An effective starting point for effective cyber security is to assess your current cyber security posture. Look at which of your systems, networks and data are secure and which are vulnerable. Consider using external providers to undertake assessments such as penetration testing to gain a complete picture. Uncovering potential vulnerabilities will then allow you to start developing an effective cyber security policy and strategy. Again, expert support with this will ensure that your cyber security approach is effective and robust.

What is asset recovery?

Asset recovery involves the confiscation of illicit assets, usually the proceeds of crime, and the return of these assets to the legitimate owner(s). Assets can take the form of money or other items of value, for example real estate, precious metals, investments such as shares, virtual assets such as cryptocurrencies, race horses, luxury goods, or an aeroplane. Asset recovery can be a purely domestic process when the funds have been hidden or invested in the jurisdiction where they were illegally obtained. It can also be international, when the funds have been sent to another jurisdiction. The process of asset recovery is complex but generally covers four basic phases: pre-investigation (verification of information), investigation (often including seizing/freezing assets and international cooperation to obtain intelligence or evidence), judicial proceedings (following which the court may issue a confiscation order for the assets), and disposal or return (where the assets are returned to the rightful owner).

Why is asset recovery important in preventing and combatting corruption?

First, for its deterrent effect. People are more likely to engage in corrupt behaviour if they are confident that – even if they are caught and convicted – they and their families will still be able to enjoy their illegally obtained wealth. Recovering illicit assets helps deter corruption by turning it into a higher-risk, lower-reward activity. Second, by convicting corrupt officials and recovering stolen assets, countries can also generate funds for development and strengthen their criminal justice system. The end results are stronger rule of law, integrity and trust in government.

What support do you offer in terms of actual cases?

Our asset recovery specialists work hand-in-hand with practitioners in our partner countries to tackle complex international financial crime cases. We are currently assisting with around 100 high-stakes cases across 20 countries.

Our assistance takes the form of advice in the following fields:

  • Intelligence gathering and analysis
  • Asset tracing
  • Financial profiling
  • Investigation and prosecution strategies
  • International cooperation and mutual legal assistance

Many of our experts are embedded in partner institutions, where they can provide closer support more efficiently and build the necessary relationships and trust.

Through our technical assistance and on-the-job coaching, we not only help to advance individual asset recovery cases but also develop skills and good practices among the practitioners we work with. That often leads to long-term reform processes to give practitioners the legal and institutional frameworks necessary to operate effectively.

While assisting with asset recovery cases, we help to identify and address gaps in national laws, policies and practices. Common challenges are:

  • Poorly developed processes for building and documenting cases
  • Lack of, inadequate, contradictory or unclear legal framework
  • Weak/inefficient international networks
  • Lack of domestic inter-agency cooperation
  • Infrastructure and technology deficits
  • Insufficient security of staff, documents and communications
  • Agencies lacking autonomy
What Our Customers Say About Us

Bettie Boyett

Excellent service, prompt responses, and the return of my password (in just two days!).

Scott W Hayes

"Keeping your information secure is their main focus..."

Marshall Weaver

They did a great job and had my funds recovered within a few days. Only downside is that it’s a little expensive.

Laura Stansberry

I would like to thank them. They worked so hard to recover my assets, over several months. I had nearly given up, but they persisted on my behalf, and they came through for me. I can't praise them enough, you can trust them with your crypto asset recovery.

Christina Douglas

They did a great job and had my account recovered within a few days. Only downside is that it’s a little expensive.

Michael

Overall excellent service They assist me in getting two of my wallets back. The team at Logan is really helpful, and I am really appreciative of their assistance. I have not used the wallets in more than four or five years, and when I returned, I essentially forgot and could not find everything. They were the only people who could have actually helped me! My life changed because of what they did; I lost everything, but now I have everything!

Get in Touch
Company

All Rights Reserved © 2011 – 2025 Aliance Consults Journalism.

This is a staging environment