Upload the sample of the compromised document into LeaksID and start an investigation. The system will determine the name of the potential leaker.
In case of a leak, it doesn’t matter how it was leaked, as:
Using an investigation tool in each case, you will find the leaker without fail.
Try it right now for free: https://leaksid.com/.