MySQL.com was hacked over the weekend via an attack which used a blind SQL injection exploit to pull off the pawnage.
Hackers extracted usernames and password hashes from the site, which were subsequently posted to pastebin.com. Any easy to guess login credentials could be easily extracted from this data using rainbow tables to match dictionary passwords to their hash values.
This information revealed that the director of product management for WordPress at MySQL1 used a four digit number as his password, among other snippets, net security firm Sophos reports.
Romanian grey-hat hackers TinKode and Ne0h of Slacker.Ro claimed responsibility for the attack.
MySQL offers open source-based database software and services to enterprises.
Security practices at MySQL.com obviously left quite a lot to be desired. As well as the vulnerability actually used to pull off the attack MySQL.com has been vulnerable to XSS exploits since January, according to XSSed.com.
MySQL's parent company Sun/Oracle was also hit by the same hackers, who extracted emails from compromised websites. Login credentials were not compromised in that case. ®
1 This chap works for MySQL not Wordpress, as incorrectly stated in the first version of this article.
Sponsored: Ransomware has gone nuclear