Crime ❯Cybercrime ❯Hacking ❯Phishing
The stolen contact data is fueling impersonation scams by phone and email to capture one‑time codes or force password resets.