Yea, there's no reason 70TB of downloaded data and millions of user accts (with each requiring an additional attack iteration) were needed to prove a security weakness.
Let alone the creation of a coordinated, decentralized network of machines to exploit the attack and maximize data extraction.