Crime ❯ Cybercrime ❯ Data Theft ❯ Unauthorized Access
Independent analyses of the leaked dataset point to backend access, raising phishing and SIM‑swap risks.