This is interesting. You can exchange or even purchase stolen or breached data to confirm its authenticity or access your own data (see haveibeenpwned). You can also leverage the data to find its origins, leaker, etc.
You cant handle other materials to find the perpetrators?
You cant handle other materials to find the perpetrators?