We've been tracking an uptick in older breaches resurfacing in combolists, often with outdated hashing algorithms like MD5. These legacy leaks, while not new, still pose a risk because password reuse is rampant. We noticed a specific case involving HMP, a Czech business entity operating in real estate, directory publications, travel, and bookkeeping-related services. What really struck us wasn't the size of the breach, but the presence of MD5 password hashes, a clear indicator of outdated security practices that, even years later, could lead to account takeovers on other platforms. This highlights the long tail of risk associated with older breaches and the continued need for password hygiene.
The HMP breach, which occurred in August 2018, exposed the credentials of 45,847 users. The data included email addresses and MD5 password hashes. While the breach itself is not recent, its reappearance in combolists amplifies the risk to individuals who may have reused their passwords across multiple services. The use of MD5, a weak hashing algorithm, makes password cracking relatively easy, even with modern hardware. This breach caught our attention due to the age of the data and the outdated security practices it reveals, which can still have significant consequences for affected users.
The breach matters to enterprises now because it underscores the persistent threat of credential stuffing and account takeover. Even if organizations have implemented robust security measures, their employees may be vulnerable if they reuse passwords exposed in older breaches. This incident highlights the need for ongoing password monitoring, employee education, and the enforcement of strong, unique passwords across all corporate accounts. The reappearance of this data also points to the effectiveness of threat actors' long-term data collection and aggregation strategies, where older breaches are combined with newer ones to maximize their impact.
Key point: Total records exposed: 45,847
Key point: Types of data included: Email Address, Password Hash
Key point: Sensitive content types: Credentials
Key point: Source structure: Not specified in provided summary
Key point: Leak location(s): Combolists
Key point: Date of first appearance: 26-Aug-2018
The HMP breach was reported in various security news outlets at the time of its occurrence. BleepingComputer, for example, covered the breach as part of a larger roundup of data breaches impacting various online services. These reports emphasized the importance of using strong, unique passwords and enabling two-factor authentication where available. The reemergence of this data in combolists serves as a reminder of the long-term consequences of data breaches and the need for continued vigilance.
Email · Address · Password · Hash
See if your personal information has been exposed in data breaches
Scan to sign up instantly
We found your data exposed in multiple breaches. This includes:
Your information is protected by enterprise-grade security