Attackers are already circling back to reselling stolen data instead of and in addition to extortion.