Within the aftermath of the RockYou attack, safety researchers, each business and academic, did intensive research on the published passwords and compiled lists of the most commonly used passwords and figured out the recurring algorithms that folks.
Here is my blog post
hotplay888