Stuck on Easy, Medium, or Hard? We have everything you need right here.
This was not a single company breach, the credentials were harvested from millions of infected user devices using infostealer ...