When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Subsequent investigation determined that the threat actors exfiltrated peoples names and Social Security Numbers.
Its faster and cheaper that way, yet apparently yields the same results.
No threat actors have assumed responsibility for the attack, as well.
ViaInfosecurity Magazine