"The hackers got access to information, including user names and email addresses." . . . . .