According to the CEO the bad actor leveraged their knowledge of technical systems, along with specialized tools and capabilities, to gain access to our testing environments and then used brute force attacks and other methods to make their way into other IT servers that included customer data. Compromised information includes customer names, addresses, Social Security numbers and government ID numbers.