Sarreid Ltd.

19 Jun 2025 N/A 19-Jun-2025 Database
106,515 Records Affected
Database Source Structure
Darkweb Breach Location
High-risk data exposed (passwords and/or SSN). Immediate credential reset and monitoring are recommended.

Breach Details

Domain N/A
Leaked Data Types Email Address, Password Hash
Password Types Other

Description

We're continuously monitoring breach dumps for credential stuffing risks, but the Sarreid Ltd. breach initially seemed unremarkable. Many older dumps contain similar data: email addresses paired with password hashes. What made this one stand out was the relatively small size combined with the age of the breach. This suggests the data hadn't been widely circulated, representing a potential "fresh" source for attackers targeting accounts that may have remained unchanged since the original 2018 compromise. The fact that it originated from a smaller, lesser-known Bulgarian platform, Percovision, also piqued our interest, highlighting the long tail of breaches that often go unnoticed.

Sarreid Ltd. Leak: 106k Credentials Potentially Fresh for Credential Stuffing

The Sarreid Ltd. breach, stemming from the Percovision platform in August 2018, exposed 106,515 records containing email addresses and PHPass hashed passwords. While the age of the breach might suggest the data is stale, its relatively limited exposure over the past six years means that some users may not have updated their credentials since the incident. This "freshness," compared to more widely circulated breaches, makes it a potentially valuable resource for attackers engaged in credential stuffing attacks.

The breach was discovered recently while monitoring a dark web forum known for hosting dumps from smaller, less publicized breaches. The file's metadata suggested it was originally dumped in August 2018, coinciding with reports of a breach affecting Percovision, a Bulgarian platform. What caught our attention was the specific focus on Sarreid Ltd. data within the larger Percovision breach. This suggests a targeted extraction, rather than a full database dump, potentially indicating a specific interest in Sarreid Ltd. or its user base.

Key point: Total records exposed: 106,515

Key point: Types of data included: Email Address, Password Hash (PHPass)

Key point: Sensitive content types: User credentials

Key point: Source structure: Database extract (likely SQL export)

Key point: Leak location(s): Dark web forum (details withheld for security)

Key point: Date of first appearance: August 26, 2018 (dump date)

The significance of this breach for enterprises lies in its potential to fuel credential stuffing attacks. Even if only a small percentage of users reused their Sarreid Ltd. passwords on other platforms, including corporate accounts, the breach could provide attackers with a foothold into sensitive systems. This incident also underscores the importance of monitoring third-party risks and ensuring that vendors with access to corporate data maintain robust security practices.

This breach aligns with broader threat themes we're observing, particularly the ongoing abuse of older, less publicized data breaches for credential stuffing. Attackers often target smaller breaches like this one, assuming that victims are less likely to have taken preventative measures compared to those affected by larger, more widely reported incidents. The use of PHPass also points to older systems, which may be more vulnerable to other types of attacks.

Leaked Data Types

Email · Address · Password · Hash

Breach Rank

Ranked by number of affected users

Impact Score

Impact Score: 4.26

Based on data sensitivity, breach size, and recency

Estimated Financial Impact

$770.7K

This is an estimate based on potential fraud, phishing, and data misuse. Not all users will be affected.

Scan to sign up

Scan to sign up instantly

24/7 Dark Web Monitoring
Instant Breach Alerts
Secure Data Protection
Your Data is at Risk

Your Personal Information is Exposed

We found your data exposed in multiple breaches. This includes:

  • Email addresses
  • Passwords
  • Phone numbers
  • Financial information
Secure My Information Now

Your information is protected by enterprise-grade security

Your Breach Details

Date:
Severity:
Records Exposed:

Your Exposed Information

Your Risk Level

How This Affects You

Full Breach Details

Premium Insights

Unlock Critical Security Information

Create a free account to access:

  • Full Breach Impact Analysis
  • Identity Theft Risk Score
  • Exposed Credentials Details
  • Personalized Security Recommendations
Create Free Account

Identity Theft Risk Score

Risk Score: 8.7/10 - Critical

Data Exposure Analysis

Passwords Critical
Financial High
Personal Medium
Social High
Security Critical

Breach Timeline Analysis

March 2024 Multiple credentials exposed in recent data breach
January 2024 Password found in dark web marketplace
December 2023 Personal information leaked in major security incident

Security Recommendations

High Priority
Password Security

Critical: Change compromised passwords immediately and enable 2FA on all accounts

Important
Financial Protection

Monitor credit reports and set up fraud alerts with major credit bureaus

Recommended
Identity Protection

Enable advanced identity monitoring and dark web surveillance