It depends. If your accounts are set up to auto-reject and ban people after X number of failed logins, then a strong password (even without 2fa) should be ok for most people.
But if the service allows for unlimited login attempts, having the same password for months or years gives more time to brute force guess it.
Even in a leak like this, even without anything more than a list of passwords, it could be a valuable collection for a "dictionary password attack".
It depends. If your accounts are set up to auto-reject and ban people after X number of failed logins, then a strong password (even without 2fa) should be ok for most people.
But if the service allows for unlimited login attempts, having the same password for months or years gives more time to brute force guess it.
Even in a leak like this, even without anything more than a list of passwords, it could be a valuable collection for a "dictionary password attack".
But why would the passwords be available unhashed?