See the trick is to not consider your data sensitive, no SENSITIVE data was leaked.

There is no data leakage from the application where the front-fell-off, because we towed the data outside the environment.

https://m.youtube.com/watch?v=3m5qxZm_JqM

‘Logs do not indicate hackers access any sensitive data, because we did not implement logging and did not look very hard for auxiliary evidence’