Crime ❯ Cybercrime ❯ Data Theft ❯ Hacking
Independent analyses of the leaked dataset point to backend access, raising phishing and SIM‑swap risks.