: Keep a close eye on your financial statements for any unauthorized small transactions.

: Verify if your email address was part of this specific or previous leaks.

: Full names, email addresses, hashed passwords, and phone numbers Potential Risks for Users