Threat actors obtained credentials and keys later used to access and decrypt some storage volumesRead More