If it was this http://www.kb.cert.org/vuls/id/682457 exploit, then almost everything could have happened I guess.


Rickard Öberg wrote:
On 2011-01-07 08.08, Niclas Hedhman wrote:
---------- Forwarded message ----------
From: Peter Neubauer<[email protected]>
Date: Fri, Jan 7, 2011 at 12:16 AM
Subject: [Infra] OPS4J server hacked (Was: ops4j.org website appears to be down)
To: General OPS4J<[email protected]>


Hi there,
we had a Exim - hack on our primary server, the boot process was
jeopardized, and the server was not booting properly, so it had to be
manually restarted in the hosting center and just came up again.

It's good to see the list is working again. Let us know if there is
any part of the infrastructure that seems to be broken - Niclas and I
apologize for the inconvenience caused during these 2 days. Anyway,
Crowd is updated now as a by-product.

Wow, that's pretty serious. Do we know what they did with the server? Why hack it? Could they have gotten to passwords and such?

/Rickard

_______________________________________________
qi4j-dev mailing list
[email protected]
http://lists.ops4j.org/mailman/listinfo/qi4j-dev

_______________________________________________
qi4j-dev mailing list
[email protected]
http://lists.ops4j.org/mailman/listinfo/qi4j-dev

Reply via email to