Utah Parent Center Logo Brining Hope, Opening Doors, Elevating Inclusion
HEROIC Mega Menu
Breach Intelligence Report 12 Sep 2025

Guide-HS HKeSports Breach: 23,503 Hong Kong Card Game Accounts Exposed (2018)

HEROIC
HEROIC Threat Intelligence Team
Email Address Password Hash
Your email may be in this breach. Check in 5 seconds — free, no signup required.
Scan Email →
Records Exposed 23,503
Source Type Database,Combolist
Origin Darkweb
Password Type MD5

Hearthstone Guides, Hacked: When Card Game Communities Become Targets

Guide-HS, a Hong Kong Hearthstone and collectible card game guides platform under the HKeSports umbrella, wasn't the kind of site that made security headlines. It was a niche resource for competitive card game players -- guides, tier lists, deck builds, community discussion. But in July 2018, 23,503 user accounts from Guide-HS were exposed, with email addresses and MD5-hashed passwords leaking from a Chinse-language gaming community that had no reason to expect it was a target.


Guide-HS / HKeSports (July 2018): Breach Summary

  • Records Exposed: 23,503
  • Data Types: Email addresses, MD5 password hashes
  • Breach Type: Database breach
  • Country Affected: Hong Kong
  • Date Leaked: July 12, 2018

Competitive Gaming Credentials and the Blizzard Problem

Hearthstone is a Blizzard Entertainment game. Players who used Guide-HS to improve their gameplay were, by definition, active Blizzard.net account holders -- the same platform used to access World of Warcraft, Overwatch, Diablo, and the Battle.net store. When credentials from a third-party Hearthstone guide site are cracked (MD5 hashes crack quickly against rainbow tables), the first thing any attacker tries is those credentials on Blizzard.net itself. Password reuse across gaming platforms is extremely common, and a guide site breach becomes a de-facto gaming account harvest for anyone willing to run credential stuffing attacks against Blizzard, Steam, or any other platorm the affected users might have registered on.


MD5 and the Niche Community Vulnerability Pattern

Small niche gaming communities often lack the security resourcing of major platforms. They're frequently built on open-source forum or CMS software with default or minimal security configurations, and they rarely have dedicated security staff. MD5 password hashing in 2018 was a legacy choice reflecting exactly this pattern: a platform that was configured once, never updated, and never audited. The Guide-HS breach fits a broader pattern of niche gaming community breaches where phpBB, vBulletin, or similar forum software with default MD5 hashing becomes the weakest link for a dedicated user base.


July 2018: Preceding the August Cluster

The Guide-HS breach leaked on July 12, 2018 -- a month before the larger coordinated August 2018 multi-wave release event that would surface dozens of platforms across five days. This earlier timing suggests Guide-HS may have been part of a different collection batch, aggregated separately before eventually circulting in the same breach marketplaces as the larger August cluster. The Hong Kong gaming community that trusted this platform had already been exposed before the major wave began.


Check If Your Credentials Were Exposed

HEROIC's free breach scanner searches across more than 400 billion exposed records -- including gaming platforms, esports communities, and card game forums. If you've ever registered on Guide-HS, HKeSports, or similar gaming platforms, check now to see if your data is circulating in breach databases.

Breach Breakdown

Domain N/A
Leaked Data Email Address,Password Hash
Password Types MD5
Date Leaked 12 Sep 2025
Check in 5 seconds

23,503 passwords exposed. Is yours one of them?

Enter your email to scan this breach plus 400B+ other leaked records. If you're compromised, we'll show you exactly where and what to change.

All information submitted is Private and Secure. We do not sell or share email addresses. By searching, you agree to HEROIC's Privacy Policy and Terms of Service.

Free forever · No account required · Results in seconds

Private & Secure No Account Needed 3,421 scanned today
Breach Rank #N/A by affected users
Impact Score
1
sensitivity + scale + recency
Est. Financial Impact $170.1K fraud, phishing & misuse risk
Scan your email Free →
Scan to sign up

Scan to sign up instantly

24/7 Dark Web Monitoring
Instant Breach Alerts
Secure Data Protection
Your Data is at Risk

Your Personal Information is Exposed

We found your data exposed in multiple breaches. This includes:

  • Email addresses
  • Passwords
  • Phone numbers
  • Financial information
Secure My Information Now

Your information is protected by enterprise-grade security

Your Breach Details

Date:
Severity:
Records Exposed:

Your Exposed Information

Your Risk Level

How This Affects You

Full Breach Details

Premium Insights

Unlock Critical Security Information

Create a free account to access:

  • Full Breach Impact Analysis
  • Identity Theft Risk Score
  • Exposed Credentials Details
  • Personalized Security Recommendations
Create Free Account

Identity Theft Risk Score

Risk Score: 8.7/10 - Critical

Data Exposure Analysis

Passwords Critical
Financial High
Personal Medium
Social High
Security Critical

Breach Timeline Analysis

March 2024 Multiple credentials exposed in recent data breach
January 2024 Password found in dark web marketplace
December 2023 Personal information leaked in major security incident

Security Recommendations

High Priority
Password Security

Critical: Change compromised passwords immediately and enable 2FA on all accounts

Important
Financial Protection

Monitor credit reports and set up fraud alerts with major credit bureaus

Recommended
Identity Protection

Enable advanced identity monitoring and dark web surveillance