From the data sample that was disclosed by the threat actor to substantiate his claim on the Dark Web, researchers were able to assess registered email addresses, password hashes, registered phone numbers, transmitted OTP information, login IPs, individual user tokens, and browser fingerprint information of the affected users.
https://ift.tt/NVApOz0
https://ift.tt/NVApOz0
Comments
Post a Comment