Attackers targeted admin accounts, and once authenticated, exported device configurations including hashed credentials and other sensitive information.

Read More