The data revealed email addresses, usernames and passwords.
The software locks down computer systems before issuing a ransom demand.
Attackers can intercept the radio signals from up to 250ft away.