Crime ❯ Cybercrime ❯ Data Breaches ❯ Extortion
Security researchers have verified the leaked dataset as authentic.