In March, hackers broke into the email accounts of more than 1.6 million Gmail users in an attack dubbed “Operation Swifty” and stole millions of personal data, including names, addresses, and phone numbers.
It also stole passwords for 1.4 million accounts.
That was a large number of accounts, but it’s not the first time an attack has targeted Gmail.
In 2014, the same group cracked a similar password-sharing scheme, but the breach was discovered in a way that was not discovered by the FBI.
Hackers used the same techniques and the same tools to gain access to the accounts as they did the accounts themselves.
The attackers then used the information to create fake accounts that they then used to steal money, identity information, and other personal data.
(The hacker group that broke into Gmail was also behind the recent “Operation Kite.”)
That attack was the largest ever, and it left Gmail users vulnerable to the same kind of attacks that are being used to target other sites.
The group behind the Swifty attack was called “Suffragette Army” and it was first identified by a Reddit user in March.
The FBI and other federal agencies have launched investigations into the attackers, and a spokesperson said the investigation was ongoing.
The investigation into the Swifthacker group began shortly after it was discovered, when the FBI received reports of “significant” activity on Reddit, the FBI said in a statement.
The hackers then went on to use the same methods and tools that they used to break into Gmail to gain information from the account, the agency said.
According to the FBI, it is “likely” that more than 100,000 accounts were compromised.
But the FBI did not provide a breakdown of the accounts.
In its statement, the bureau said it does not have information on how many accounts were targeted.
The accounts were exposed after the attackers used phishing and social engineering to trick people into clicking on links that showed the websites that the accounts were linked to.
The phishing emails were sent to the inboxes of those people who clicked on them.
Once clicked, the emails were delivered to the compromised accounts.
As part of the investigation, the email account and password of the account holder were compromised and the account was used to access the accounts of other people.
After they accessed the accounts, the attackers created fake accounts and then used those accounts to steal passwords.
The fake accounts were then used by the hackers to gain control over those accounts, which included passwords for their contacts, bank accounts, and home addresses.
In some cases, the fake accounts allowed the hackers access to account information, like credit card numbers, birth dates, addresses and phone number.
The victims were also provided with links to malicious websites that allowed them to log into those sites and gain unauthorized access to them.
The attack targeted Gmail accounts in more than 30 countries, including Australia, Brazil, Canada, Colombia, France, Germany, India, Italy, Japan, Mexico, New Zealand, Poland, South Africa, South Korea, Sweden, Taiwan, and the United Kingdom.
The Associated Press is not naming the affected users for privacy reasons.
The AP is withholding the names of the affected individuals.
The company said it had no idea how many users had been affected and that it was working to notify the accounts affected.
In the statement, Gmail said it is taking the incident seriously and has started “the appropriate steps to mitigate any further risk to our users and to make sure that we have a more resilient product.”