Affected users are advised to enable two-factor authentication and monitor their accounts for suspicious activity.
The hacker, operating under the alias “GhostCry,” claimed to have obtained a database containing over 200,000 user records, including email addresses, hashed passwords, and IP logs. A sample of the data was shared with cybersecurity researchers, who confirmed it appears legitimate.
– April 18, 2026




