Stolen information includes names, email addresses, trade data, and hashed passwords.Read more from the Source Post navigationResearchers Uncover Android Spying Campaign Targeting Pakistan Officials The Weakest Link in Your Security Posture: Misconfigured SaaS Settings