This is how criminals exploit the leak: