After a data breach, it can be common to receive emails, texts or phone calls that are highly personalized. Attackers use stolen data to create more believable attempts, create a sense of urgency, and use fear tactics caused by a breach to manipulate victims.
Be extra vigilant for suspicious communication requesting personal information and report any attempts to authorities.