In this data breach, threat actors merged available public data with private email addresses and phone numbers to develop profiles of twitter users by using another twitter api to scrape the public twitter …