Trezor suggests that attackers appear to be using data obtained from the hack of a competitor’s e-commerce database.