Utah Parent Center Logo Brining Hope, Opening Doors, Elevating Inclusion
HEROIC Mega Menu
Breach Intelligence Report 05 Jun 2025

Search Your Email: The Fireworks Food Breach Exposed 18,280 Accounts

HEROIC
HEROIC Threat Intelligence Team
Email Address Password Hash Username First Name Last Ip Salt
Your email may be in this breach. Check in 5 seconds — free, no signup required.
Scan Email →
Records Exposed 18,280
Source Type Database
Origin Darkweb
Password Type bcrypt, MD5(Salt)

HEROIC analysts found the Fireworks Food database circulating in underground markets in May 2023. The breach captured roughly 22,000 records from the Australian e-commerce platform, with 18,280 unique email addresses confirmed in the dataset. What made this one stand out was the presence of two different password hashing methods side by side: bcrypt and MD5 with salt. That mix suggests the site was mid-upgrade when the database was taken, or older accounts were never properly migrated to the stronger algorithm.


Your Fireworks Food Credentials Could Be Cracked Right Now

Attackers who got their hands on this data are not sitting idle. MD5 hashed passwords, even with a salt, can be reversed quickly using modern GPU-accelerated cracking tools. Anyone whose account used a legacy MD5 hash is particularly at risk. With a cracked password, a username, a full name, and an email address all in one record, a threat actor has everything needed to attempt logins across dozens of other platforms. Credential stuffing tools can cycle through thousands of sites in hours, so the window to act is short.


What Was Exposed in the Fireworks Food Breach

  • Email addresses (18,280 unique)
  • Password hashes (bcrypt and MD5 with salt)
  • Usernames
  • First and last names
  • IP addresses

Why This Breach Is More Dangerous Than It Looks

Eighteen thousand records sounds small compared to mega-breaches, but the combination of full names, email addresses, and crackable password hashes makes each record highly actionable. Attackers use this kind of data for credential stuffing, targeted phishing, and identity fraud. The salt on the MD5 hashes slows down cracking but does not stop it, partcularly with commodity cloud computing now accessable to almost any threat actor. Anyone who reused their Fireworks Food password elsewhere is at real risk of account takeover.


How Database Breaches Work

A database breach typically happens when an attacker finds a way into the backend of a web application, usually through a vulnerability like SQL injection, a misconfigured server, or stolen admin credentials. Once inside, they run queries that pull the entire user table in seconds. The data is then compressed, exfiltrated, and eventually sold or shared in private forums. By the time a company notices the intrusion, the data has often already changed hands multiple times. Smaller e-commerce sites are frequently targeted because they hold real customer data but often lack the security resources of larger retailers.


Check If Your Data Was Exposed

HEROIC offers a free dark web scanner that has indexed over 400 billion recieved records from breaches just like this one. If your email address appeared in the Fireworks Food database or any other known breach, the scanner will tell you exactly what was exposed. Run a free scan at HEROIC.com and find out in seconds whether your credentials are already in the hands of threat actors.

Breach Breakdown

Domain N/A
Leaked Data Email Address, Password Hash, Username, First Name, Last Name, IP Address, Salt
Password Types bcrypt, MD5(Salt)
Date Leaked 05 Jun 2025
Check in 5 seconds

18,280 passwords exposed. Is yours one of them?

Enter your email to scan this breach plus 400B+ other leaked records. If you're compromised, we'll show you exactly where and what to change.

All information submitted is Private and Secure. We do not sell or share email addresses. By searching, you agree to HEROIC's Privacy Policy and Terms of Service.

Free forever · No account required · Results in seconds

Private & Secure No Account Needed 2,379 scanned today
Breach Rank #N/A by affected users
Impact Score
1
sensitivity + scale + recency
Est. Financial Impact $132.3K fraud, phishing & misuse risk
Scan your email Free →
Scan to sign up

Scan to sign up instantly

24/7 Dark Web Monitoring
Instant Breach Alerts
Secure Data Protection
Your Data is at Risk

Your Personal Information is Exposed

We found your data exposed in multiple breaches. This includes:

  • Email addresses
  • Passwords
  • Phone numbers
  • Financial information
Secure My Information Now

Your information is protected by enterprise-grade security

Your Breach Details

Date:
Severity:
Records Exposed:

Your Exposed Information

Your Risk Level

How This Affects You

Full Breach Details

Premium Insights

Unlock Critical Security Information

Create a free account to access:

  • Full Breach Impact Analysis
  • Identity Theft Risk Score
  • Exposed Credentials Details
  • Personalized Security Recommendations
Create Free Account

Identity Theft Risk Score

Risk Score: 8.7/10 - Critical

Data Exposure Analysis

Passwords Critical
Financial High
Personal Medium
Social High
Security Critical

Breach Timeline Analysis

March 2024 Multiple credentials exposed in recent data breach
January 2024 Password found in dark web marketplace
December 2023 Personal information leaked in major security incident

Security Recommendations

High Priority
Password Security

Critical: Change compromised passwords immediately and enable 2FA on all accounts

Important
Financial Protection

Monitor credit reports and set up fraud alerts with major credit bureaus

Recommended
Identity Protection

Enable advanced identity monitoring and dark web surveillance