Understanding and Leveraging Breached Data