The exposed data due to the incident includes names, tax ID, social security numbers, with some also having their bank, license, passport details, medical information, routing numbers, insurance policy details, and life and annuity policy data breached.

Scammers Exploit Disposable VoIP Numbers to Bypass Reputation Blocking
New tactics used by threat actors who embed phone numbers in scam emails as a key indicator of compromise (IOC), revealing how attackers exploit VoIP


.webp?w=0&resize=0,0&ssl=1)