Names and icons are changed, and new profiles are added to maximize the number of people using one stolen account.
Once a hacker logs in, they often change the email and password, locking the original owner out. 133x Disney .txt
Hackers often version their leaks to track which data is "fresh" versus "stale" (already changed by users). 3. Impact on Users Names and icons are changed, and new profiles
Users continue to pay for a service while strangers use it for free. How to Protect Your Account Names and icons are changed