Crime ❯ Cybercrime ❯ Data Theft ❯ Extortion
Investigators trace the intrusion to a compromised integration partner exploiting an API validation flaw with valid credentials.