We've been tracking a resurgence of older forum breaches appearing in aggregated data dumps, often repackaged and sold as "new" material. What initially seemed like a minor blip on our radar – a relatively small database from the Australian BodyBuilding Forum (ABB) – quickly revealed a concerning trend: the persistence of legacy credentials and their potential for account takeover across seemingly unrelated platforms. The age of the breach is deceptive; its impact remains relevant due to password reuse.
A database breach impacting the Australian BodyBuilding Forum (ABB), dating back to November 1, 2016, has resurfaced in several dark web marketplaces and Telegram channels. While the breach itself is not new, its reappearance highlights the enduring risk posed by older compromised credentials. What caught our attention was the continued availability of this data, despite its age, and the potential for password reuse across other services.
The breach, affecting 987 users, is a database dump that appears to contain no leaked data types. This is unusual, and it is believed the database contains hashed passwords. The data was observed circulating on several Telegram channels known for trading compromised credentials. The relatively small size of the breach is misleading; even a handful of valid credentials can provide attackers with a foothold into other, more valuable accounts if users have reused passwords.
This incident underscores a broader threat theme: the long tail of credential compromise. Even breaches from years ago can continue to pose a risk if users haven't updated their passwords. The automation of credential stuffing attacks means that even small leaks can be leveraged at scale.
Key point: Total records exposed: 987
Key point: Types of data included: Usernames, email addresses, hashed passwords (likely)
Key point: Sensitive content types: None
Key point: Source structure: Database dump
Key point: Leak location(s): Telegram channels, dark web marketplaces
Key point: Date of first appearance: November 1, 2016 (original breach), resurfaced in late 2023/early 2024.
While this specific breach hasn't garnered significant media attention, the broader issue of password reuse and the persistence of older breaches is well-documented. Security researcher Troy Hunt maintains the "Have I Been Pwned?" website, which tracks publicly known data breaches and allows users to check if their accounts have been compromised. Resources like HaveIBeenPwned highlight the importance of password management and the risks associated with reusing credentials.
None
See if your personal information has been exposed in data breaches
Scan to sign up instantly
We found your data exposed in multiple breaches. This includes:
Your information is protected by enterprise-grade security