Crime ❯ Cybercrime ❯ Hacking ❯ Data Theft
Independent analyses of the leaked dataset point to backend access, raising phishing and SIM‑swap risks.