We've been tracking an increase in older database breaches resurfacing in combolists and credential stuffing attacks. What struck us about this particular incident wasn't the volume of records, but the fact that the exposed passwords were stored in plaintext. This suggests outdated security practices that could still be present in other systems. The breach involved a French news platform, **Actualites News Environnement**, with the data appearing on a well-known hacking forum. This highlights the persistent risk posed by legacy vulnerabilities and the value of even older data in modern attacks.
In August 2018, **Actualites News Environnement**, a French news platform focused on environmental topics, experienced a data breach. The compromised data, containing **36,427 records**, was recently posted on a prominent hacking forum known for trading in breached databases and combolists. The exposure of plaintext passwords is particularly concerning, as it allows for immediate account takeover attempts across other platforms where users may have reused the same credentials. This breach serves as a stark reminder of the long-term consequences of poor security practices and the enduring value of compromised data to malicious actors.
The breach came to our attention as part of routine monitoring of underground forums where breached data is commonly traded and shared. The post explicitly advertised the database of **Actualites News Environnement**, claiming it contained a significant number of unique email addresses and passwords. What caught our attention was the explicit mention of "plaintext passwords," a relatively rare occurrence in recent breaches, suggesting a failure to implement even basic hashing algorithms. This significantly increases the risk of credential stuffing attacks, where these credentials are used to attempt unauthorized access to other online services.
The fact that this breach is resurfacing years later underscores the need for enterprises to proactively monitor for leaked credentials and implement robust password management policies. Even older breaches can have a significant impact if the exposed data is still valid and actively being used in attacks. The exposure of plaintext passwords makes this breach particularly dangerous, as it bypasses many common security measures and allows attackers to directly compromise user accounts.
Key point: Total records exposed: **36,427**
Key point: Types of data included: **Email Addresses, Plaintext Passwords**
Key point: Source structure: Likely a **database export** (specific format unknown)
Key point: Leak location: Prominent **hacking forum** (name withheld for security reasons)
Key point: Date of first appearance: **August 24, 2018**
Security researcher Troy Hunt added the breach to HaveIBeenPwned on August 25, 2018. The entry confirms the data was obtained from a "combolist" and impacted over 36,000 users. As HaveIBeenPwned notes, "Compromised data includes email addresses and plaintext passwords." This incident highlights a significant vulnerability and risk to affected users.
Email · Address · Plaintext · Password
See if your personal information has been exposed in data breaches
Scan to sign up instantly
We found your data exposed in multiple breaches. This includes:
Your information is protected by enterprise-grade security