Re: Since when is MD5 "easily breakable"?
If they're using MD5, then they're unlikely to have salted the hash. In that case the passwords can be cracked using rainbow tables, so deriving the password from the hash is easy (even with your random password suggested).
Why would you do it? My main reason would be that a lot of people have only 2 passwords. The weak one that they use to sign up to services using their email as the userid, and of course the strong one which they use for specific services like online banking etc. They would of course use this for their email password, as they don't want to give out their email password when signing up to new services using their email address.