We've observed a consistent pattern of older breaches resurfacing in new combolists and credential stuffing attacks, often impacting smaller platforms that may have lacked robust security practices at the time of the initial incident. What caught our attention wasn't the size of the CAI Studio breach itself, but the fact that it continues to fuel password reuse risks, especially given that the exposed passwords were stored in plaintext. The data had been circulating quietly within underground communities, but we noticed an uptick in mentions alongside discussions of automated credential testing against educational platforms.
The August 2018 breach of CAI Studio, a Thai-based educational platform, exposed 34,371 unique email addresses and plaintext passwords. The breach initially occurred due to a database compromise. The concerning aspect is that the passwords were not hashed or salted, leaving them vulnerable to immediate compromise. The compromised data was subsequently posted on a prominent hacking forum and has since been incorporated into various combolists used in credential stuffing attacks. This type of breach matters to enterprises now because it highlights the long tail of risk associated with older data breaches and the persistent threat of password reuse. It underscores the importance of proactive credential monitoring and employee education about password hygiene.
Breach Stats:
* Total records exposed: 34,371
* Types of data included: Email Address, Plaintext Password
* Sensitive content types: Passwords stored in plaintext
* Source structure: Database
* Leak location(s): Prominent hacking forum
The fact that CAI Studio stored passwords in plaintext is a stark reminder of the security practices prevalent several years ago. While specific forum links are often ephemeral, similar breaches are routinely discussed on sites like BreachForums (previously known as RaidForums) where users share and trade combolists. The risk posed by such breaches is amplified by the increasing sophistication of credential stuffing tools and the automation of attacks.
Email · Address · Plaintext · Password
See if your personal information has been exposed in data breaches
Scan to sign up instantly
We found your data exposed in multiple breaches. This includes:
Your information is protected by enterprise-grade security