: Keep a close eye on your financial statements for any unauthorized small transactions.
: Verify if your email address was part of this specific or previous leaks.
: Full names, email addresses, hashed passwords, and phone numbers Potential Risks for Users