. "Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes." . . . .