The compromise has garnered quite an interest from the security community for two simple reasons.
For one, it seems that MySQL.com (and MySQL.fr, MySQL.de and MySQL.it) servers have been targeted with a blind SQL injection attack by two hackers that go by "TinKode" and "Ne0h". According to Techie Buzz, it is possible that an XSS vulnerability affecting MySQL.com - discovered and submitted by TinKode back in January - has also been used in the attack.
Details of the blind SQL injection vulnerability have been revealed in an email sent to the Full-Disclosure mailing list.
Secondly, the login credentials revealed in the published part of the database have demonstrated that MySQL employees are not big fans of strong passwords. For example, Robin Schumacher, MySQL's Director of Product Management, uses a simple four digit password for WordPress. A number of other accounts have "qa" as a password.
Sun, MySQL's parent company, has also been attacked by the same hackers. The targeted websites are www.reman.sun.com and www.ibb.sun.com, and they also proved to be vulnerable to a SQL injection attack. Whether they exploited the same vulnerability that compromised MySQL.com, they didn't say. The hackers again published some of the gathered information, but this time they didn't make login credentials public.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.