When a server gets compromised they will download the table from any software that contains user data. From there they will attack the hashed passwords using common passwords and a dictionary attack. There is only about 250K English words so trying them all of them and combinations of them is fairly trivial. That's going to net them about 10 to 30 percent of the passwords. Now they have an associated username, email address and password they can try elsewhere.