compromised by SQL injection attack
Posted on 28 March 2011. has been hacked and a part of the database containing member and employee email addresses, usernames and passwords has been published by the hackers on

The compromise has garnered quite an interest from the security community for two simple reasons.

For one, it seems that (and, and servers have been targeted with a blind SQL injection attack by two hackers that go by "TinKode" and "Ne0h". According to Techie Buzz, it is possible that an XSS vulnerability affecting - discovered and submitted by TinKode back in January - has also been used in the attack.

Details of the blind SQL injection vulnerability have been revealed in an email sent to the Full-Disclosure mailing list.

Secondly, the login credentials revealed in the published part of the database have demonstrated that MySQL employees are not big fans of strong passwords. For example, Robin Schumacher, MySQL's Director of Product Management, uses a simple four digit password for WordPress. A number of other accounts have "qa" as a password.

Sun, MySQL's parent company, has also been attacked by the same hackers. The targeted websites are and, and they also proved to be vulnerable to a SQL injection attack. Whether they exploited the same vulnerability that compromised, they didn't say. The hackers again published some of the gathered information, but this time they didn't make login credentials public.


More than a third of employees would sell company data

35 percent of employees would sell information on company patents, financial records and customer credit card details if the price was right. This illustrates the growing importance for organizations to deploy data loss prevention strategies.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Jul 31st