We've been tracking a concerning trend of smaller, localized breaches often overlooked in the shadow of larger, more publicized incidents. What really struck us about this breach wasn't the volume of records, but the specific nature of the affected organization: a Korean religious organization. The data had been circulating quietly for years, but we noticed a recent uptick in mentions on several Korean-language hacking forums, suggesting renewed interest and potential exploitation. The setup here felt different because the password storage format was unknown, raising questions about the security practices in place at the time.
The breach at S&H Business Apparel & Footwear, a Korean religious organization website, came to light on August 26, 2018. It was discovered through our routine monitoring of publicly available breach databases and associated forum chatter. What caught our attention was the combination of the organization's specific religious affiliation and the "unknown" password hash format, indicating potentially outdated or non-standard security measures. This matters to enterprises now because it highlights the persistent risk posed by legacy systems and the potential for attackers to revisit old breaches as password cracking technology improves. It also underscores the need for organizations of all sizes to adhere to modern security standards and transparently document their security implementations.
Key point: Total records exposed: 73,808
Key point: Types of data included: Email Address, Password Hash
Key point: Sensitive content types: None explicitly mentioned, but email addresses associated with a religious organization could reveal sensitive affiliations.
Key point: Source structure: Database
Key point: Leak location(s): Public breach databases, Korean-language hacking forums
Key point: Date of first appearance: 26-Aug-2018
While this specific breach hasn't received widespread coverage in mainstream English-language media, the broader issue of database breaches affecting smaller organizations is well-documented. Security researcher Troy Hunt's "Have I Been Pwned?" database includes this breach, highlighting its presence in the public domain. The lack of documented password hashing algorithms points to a potential vulnerability, as discussed in numerous OWASP guidelines regarding secure password storage. These guidelines emphasize the importance of using modern, well-vetted hashing algorithms like bcrypt or Argon2.
Email · Address · Password · Hash
See if your personal information has been exposed in data breaches
Scan to sign up instantly
We found your data exposed in multiple breaches. This includes:
Your information is protected by enterprise-grade security