We've been closely tracking the re-emergence of older breach datasets in combilists across various underground forums. What really struck us wasn't the size of this particular leak—it was the age and the continued viability of the credentials within. The data from **Clement Design**, a French e-commerce platform specializing in professional attire, initially surfaced in **February 2018**. While seemingly dated, the persistence of these credentials in circulation underscores the long tail of risk associated with older breaches and the continued reliance on outdated password practices.
The breach at **Clement Design** exposed over **22,000 unique email addresses** coupled with **MD5 hashed passwords**. This particular combination is problematic, not because MD5 is inherently unbreakable, but because its susceptibility to rainbow table attacks and pre-computed hash collisions dramatically reduces the effort required to crack them. The data was discovered on several prominent combolist aggregators and password cracking forums, suggesting it's actively being used in credential stuffing attacks. While the initial breach occurred in **2018**, the continued availability and utility of this data highlights the enduring risk posed by older breaches.
The breach caught our attention due to the surprisingly high rate of successful credential re-use associated with this dataset. Initial analysis suggests that a significant portion of these credentials still grant access to other online services, likely due to users re-using passwords across multiple platforms. This matters to enterprises because it demonstrates how seemingly "old" data can still be leveraged to compromise accounts and gain unauthorized access to sensitive systems.
Key point: Total records exposed: 22,348
Key point: Types of data included: Email Address, Password Hash (MD5)
Key point: Sensitive content types: Potentially PII if users re-used credentials across sensitive accounts.
Key point: Source structure: Likely database export, format unspecified.
Key point: Leak location(s): Combolist aggregators, password cracking forums.
Key point: Date leaked: 07-Feb-2018 (initial breach), actively circulating in 2024.
The re-emergence of this **Clement Design** data aligns with a broader trend of attackers leveraging older breaches for credential stuffing and account takeover attacks. Security researcher Troy Hunt maintains a vast database of breaches at HaveIBeenPwned.com, and the Clement Design breach is included in that collection, demonstrating its established history. The continued availability of cracked or easily crackable MD5 hashes emphasizes the importance of modern password hashing algorithms and proactive password reset policies. The use of MD5 hashing, considered weak even in 2018, further underscores the need for organizations to adopt robust cybersecurity practices.
Email · Address · Password · Hash
See if your personal information has been exposed in data breaches
Scan to sign up instantly
We found your data exposed in multiple breaches. This includes:
Your information is protected by enterprise-grade security