Below is a draft blog post addressing this incident and offering guidance for users.
If you have shared public links to your Mega folders, remember that anyone with the link (and its key) can view those files. Final Thoughts MEGA: Protect your Online Privacy logs_mega.txt
Use tools like Have I Been Pwned to see if your email address has appeared in any known data breaches. Below is a draft blog post addressing this
The "logs_mega.txt" Leak: What You Need to Know About Your Cloud Security logs_mega.txt
Mega supports 2FA, which adds a critical second layer of defense. Even if an attacker has your password, they won't be able to log in without your physical device.