. "Attackers may be able to access highly valuable information with stolen credentials, such as seismic survey data, deal financials, intellectual property and other material." . . .