Identified method used to capture/steal data: How was the Date stolen or compromised?

-
- Tested: the compromised data was tested to determine if it is live/active;
-
Sample: the compromised data was posted to prove its validity;
-
Keylogged or Phished: the compromised data was entered into a fictitious websiteor extracted through software designed to steal PII;
-
3rd Party Breach: the compromised data was exposed as part of a company’s internal data breach or on a 3rd party Website;
-
Accidental Exposure: the compromised data was accidentally shared on a Web, social media, or Peer-to-Peer site;
-
Malicious / Doxed: the compromised data was intentionally broadcast to expose PII.