Thanks for letting people know, but this always happens with any type of software that is released or leaked. Hacks are naturally an easy target, since a lot of people don't take the necessary precautions before testing something from an unknown source. A lot of people take the risk and usually end up paying for it. There's nothing software developers can do about this on an insecure computing platform. It's all on the end users to ensure they are not using illegitimate software versions and treat everything as "untrusted", no matter whose name is on it or where it came from.