The alleged attacker detailed their methodology, stating they captured IP traffic from the website and were able to decrypt certain information. They further assert that gaining access to project management accounts facilitated the subsequent data extraction.
Evidence presented by the individual includes links to files allegedly containing captured network traffic, decrypted data, and images described as “proof of access.” The alleged full database is also purportedly available through a provided link.
Further details regarding the alleged breach’s target information and how it was breached were also shared through external links.