. . "For example, we now know that the affected systems held debit and credit card information, such as numbers and expiration dates." . . . .