1
Hackers may possibly also sell the fruits of their labor: taken email and personal information directories that others could use in identity robbery and other schemes.
Lists for sale included customers who participated in an automobile.