Sixgill states that these credentials can be used to accomplish a plethora of seedy activities, such as eavesdropping on corporate calls and identity theft, among others.

Read more here.