Rock 107

05 Aug 2025 N/A 05-Aug-2025 Database
35,477 Records Affected
Database Source Structure
Telegram Breach Location
High-risk data exposed (passwords and/or SSN). Immediate credential reset and monitoring are recommended.

Breach Details

Domain N/A
Leaked Data Types Email Address, Password Hash
Password Types Other

Description

We've been tracking an uptick in older breach datasets resurfacing in underground forums, often repackaged and sold as "new" leaks. What really struck us wasn't the volume—most of these breaches are relatively small—but the persistence. The data had been circulating quietly, but we noticed an increase in threat actors using these older credentials in credential stuffing attacks, particularly targeting smaller businesses that may not have robust security measures in place. This breach, involving the now-defunct gaming platform **Wplay ISRL**, is a prime example.

Rock 107 Breach: Resurfaced 35k User Credentials Fueling Credential Stuffing

In August 2018, the Israeli gaming platform **Wplay ISRL** suffered a data breach affecting over 35,000 unique records. The exposed data, consisting of email addresses and passwords hashed with **PHPass**, recently resurfaced on several dark web forums. While the breach itself is not new, its renewed availability makes it relevant to enterprises now. The breach caught our attention due to the increased chatter on Telegram channels dedicated to credential stuffing, with several actors specifically mentioning the **Wplay ISRL** dataset as a "good source" for targeting smaller online retailers and gaming sites.

This breach matters to enterprises because it underscores the long tail of risk associated with compromised credentials. Even years after a breach occurs, the exposed data can still be weaponized in automated attacks. The relatively weak **PHPass** hashing algorithm used to protect the passwords further exacerbates the risk, as it makes it easier for attackers to crack the passwords and gain access to user accounts on other platforms.

This activity connects to broader threat themes we're observing, including the increasing automation of credential stuffing attacks and the use of Telegram marketplaces for the distribution of compromised data. By leveraging readily available breach datasets like the **Wplay ISRL** leak, attackers can efficiently target a large number of potential victims with minimal effort.

Key point: Total records exposed: 35,477

Key point: Types of data included: Email Address, Password Hash

Key point: Sensitive content types: User Credentials

Key point: Source structure: Database

Key point: Leak location(s): Dark Web Forums, Telegram Channels

Key point: Date leaked: 26-Aug-2018

The reemergence of the **Wplay ISRL** breach aligns with a broader trend of older breaches being actively exploited. As noted in a recent BleepingComputer article, threat actors are increasingly targeting outdated systems and vulnerabilities, often finding them easier to compromise than more modern defenses. This highlights the importance of continuous monitoring for compromised credentials and proactive password resets, even for services that are no longer actively used.

Leaked Data Types

Email · Address · Password · Hash

Breach Rank

Ranked by number of affected users

Impact Score

Impact Score: 1.42

Based on data sensitivity, breach size, and recency

Estimated Financial Impact

$256.7K

This is an estimate based on potential fraud, phishing, and data misuse. Not all users will be affected.

Scan to sign up

Scan to sign up instantly

24/7 Dark Web Monitoring
Instant Breach Alerts
Secure Data Protection
Your Data is at Risk

Your Personal Information is Exposed

We found your data exposed in multiple breaches. This includes:

  • Email addresses
  • Passwords
  • Phone numbers
  • Financial information
Secure My Information Now

Your information is protected by enterprise-grade security

Your Breach Details

Date:
Severity:
Records Exposed:

Your Exposed Information

Your Risk Level

How This Affects You

Full Breach Details

Premium Insights

Unlock Critical Security Information

Create a free account to access:

  • Full Breach Impact Analysis
  • Identity Theft Risk Score
  • Exposed Credentials Details
  • Personalized Security Recommendations
Create Free Account

Identity Theft Risk Score

Risk Score: 8.7/10 - Critical

Data Exposure Analysis

Passwords Critical
Financial High
Personal Medium
Social High
Security Critical

Breach Timeline Analysis

March 2024 Multiple credentials exposed in recent data breach
January 2024 Password found in dark web marketplace
December 2023 Personal information leaked in major security incident

Security Recommendations

High Priority
Password Security

Critical: Change compromised passwords immediately and enable 2FA on all accounts

Important
Financial Protection

Monitor credit reports and set up fraud alerts with major credit bureaus

Recommended
Identity Protection

Enable advanced identity monitoring and dark web surveillance