Assessing Damage of Processor Data Hack