HIAPK.com

25 Jul 2022 N/A 25-Jul-2022 Database
7,881,078 Records Affected
Database Source Structure
Telegram Breach Location
High-risk data exposed (passwords and/or SSN). Immediate credential reset and monitoring are recommended.

Breach Details

Domain N/A
Leaked Data Types email, passwordhash, salt
Password Types vB

Description

We've been tracking the increasing volume of credential stuffing attacks targeting mobile gaming and application platforms. What really struck us wasn't the scale of the HIAPK.com breach itself—7.8 million records is significant, but not unprecedented—it was the relative age of the data and its continued utility for attackers. This breach, dating back several years, underscores the persistent risk posed by legacy data and the long tail of impact from even older breaches. The continued availability of this data in various breach compilation lists makes it a readily accessible resource for threat actors.

The Android App Store Database Spill: 7.8M Accounts Exposed

HIAPK.com, an alternative Android app store, suffered a database breach that exposed 7,881,078 user records. The breach, which appears to have occurred some time ago, was recently brought to our attention through its reappearance in multiple popular breach aggregation services, including Telegram channels dedicated to credential stuffing. This re-emergence prompted a deeper investigation into the nature and potential impact of the exposed data.

The compromised data includes email addresses, password hashes, and salts. While the presence of salts provides a degree of protection against straightforward password cracking, the age of the data means that many users likely haven't updated their passwords since the breach occurred. Furthermore, the use of older or weaker hashing algorithms in the past may make the passwords easier to crack using modern techniques. The leak was structured as a database dump, making it easy for attackers to ingest and process the information.

The re-emergence of the HIAPK.com data underscores a growing trend: the weaponization of older breaches. Threat actors are increasingly leveraging historical data to conduct credential stuffing attacks against a wide range of online services. The assumption is that password reuse is rampant, and that even old credentials can provide access to current accounts.

Key point: Total records exposed: 7,881,078

Key point: Types of data included: Emails, Password Hashes, Salts

Key point: Sensitive content types: User account credentials

Key point: Source structure: Database dump

Key point: Leak location(s): Telegram channels, Breach Forums

External Context & Supporting Evidence

Similar breaches of Android app stores and gaming platforms have been reported previously. For example, in 2020, security researcher Alon Gal highlighted a massive database of mobile gaming accounts being sold on the dark web (source: *BleepingComputer*). This highlights the ongoing vulnerability of these platforms and the value that attackers place on user credentials within these ecosystems. Discussions in several hacking forums suggest that older breach datasets are actively traded and used for "spray and pray" credential stuffing campaigns, targeting everything from e-commerce sites to cryptocurrency exchanges.

Leaked Data Types

Email · Passwordhash · Salt

Breach Rank

#25

Ranked by number of affected users

Impact Score

Impact Score: 40.00

Based on data sensitivity, breach size, and recency

Estimated Financial Impact

$57.0M

This is an estimate based on potential fraud, phishing, and data misuse. Not all users will be affected.

Get Early Access to the Guardian Platform

HEROIC is close to launching our next-generation platform where you can search, secure, and monitor all of your identities. To be the first in line, simply insert your email and you'll be added to the list

Please correct the marked field(s) below.

Be the first to know when we launch

HEROIC is still under development, but we are well underway. We estimate launching in early 2024. Subscribing lets you know when we launch, and how you can be the first to reserve your HERO's (special currency specific to the platform).

Sign Up for Our Newsletter

Email marketing by Interspire

Scan to sign up

Scan to sign up instantly

24/7 Dark Web Monitoring
Instant Breach Alerts
Secure Data Protection
Your Data is at Risk

Your Personal Information is Exposed

We found your data exposed in multiple breaches. This includes:

  • Email addresses
  • Passwords
  • Phone numbers
  • Financial information
Secure My Information Now

Your information is protected by enterprise-grade security

Your Breach Details

Date:
Severity:
Records Exposed:

Your Exposed Information

Your Risk Level

How This Affects You

Full Breach Details

Premium Insights

Unlock Critical Security Information

Create a free account to access:

  • Full Breach Impact Analysis
  • Identity Theft Risk Score
  • Exposed Credentials Details
  • Personalized Security Recommendations
Create Free Account

Identity Theft Risk Score

Risk Score: 8.7/10 - Critical

Data Exposure Analysis

Passwords Critical
Financial High
Personal Medium
Social High
Security Critical

Breach Timeline Analysis

March 2024 Multiple credentials exposed in recent data breach
January 2024 Password found in dark web marketplace
December 2023 Personal information leaked in major security incident

Security Recommendations

High Priority
Password Security

Critical: Change compromised passwords immediately and enable 2FA on all accounts

Important
Financial Protection

Monitor credit reports and set up fraud alerts with major credit bureaus

Recommended
Identity Protection

Enable advanced identity monitoring and dark web surveillance