Stolen information includes names, email addresses, trade data, and hashed passwords.
Computing, Web, Networks, Security and Breaches
the alter ego of Jeffric Pisuena

Stolen information includes names, email addresses, trade data, and hashed passwords.