Let me just say that the encryption algorithm could've been stronger. For example, bcrypt or something like what Wordpress implements. Now THOSE are some tough hashes to crack. Hell, even cracking the password "123411" with a bcrypt hash would take up too many resources for the average person.
This leak however contained two different algorithms from what I'm aware. SHA1 & something that looks like this.
Password: $5$rounds=7500$bOzfMJtV+ltz8dF+$jeWxjkMFW8Dv389us5iJ5KSBmb8wjkZOhns4UGeMpp.
A SHA1 hash is just 64 characters of numbers and letters. They are much easier to crack. However, the algorithm in this case doesn't matter if you had an easy password such as 1-10 numbers, a bunch of letters, or if your password was in a wordlist.
Password: $5$rounds=7500$bOzfMJtV+ltz8dF+$jeWxjkMFW8Dv389us5iJ5KSBmb8wjkZOhns4UGeMpp
Once you crack that (took me a few seconds) you'll get this as the plaintext password.
'22362236'
$5$rounds=7500$bOzfMJtV+ltz8dF+$jeWxjkMFW8Dv389us5iJ5KSBmb8wjkZOhns4UGeMpp:22362236
And the fact that many of you are probably in other database leaks and use the same password makes it even easier for someone to compromise your account. Good thing for you guys is that no one gives a shit about Bitcointalk accounts so you're all probably safe for now.