It’s not unusual for a threat actor to exaggerate the extent of a hack or breach to drum up interest, and hopefully, the eventual purchase or ransom price.
blog.talosintelligence.com
blog.talosintelligence.com
Create attached notes ...
