I’ve checked and the passwords that Apple flagged, and those had been in dumps of my accounts from else-network. In years past, I did re-use some of what I considered throw-away passwords. Anyway, you do you, of course.
As for hashes, there are two sorts in common use. Digest hashes, which are fast to calculate, but slow to generate collisions (matching hashes), and password hashes, which are intentionally slow to calculate, and slow to generate collisions. The former are unfortunately sometimes misused for passwords. The latter are designed to be resource-intensive for memory and difficult to parallelize, and expensive to implement in hardware.
Brute-forcing passwords is certainly possible, with better password hashes and longer and more robust passwords pushing that brute-forcing into decades or centuries with current hardware.
Brute-forcing involves first trying previously-used passwords (which is what Apple is flagging, here), then trying widely-used passwords, then trying variations of those, then trying every password. The lattermost effort takes a very long time with algorithms such as PBKDF2 and bcrypt, and rather less time with a password store that chose a (quicker-to-calculate) message digest hash.