Creative Commons license icon

Reply to comment

Based on the information available, I'm betting that the leaked source code included connection strings that let someone connect directly to their database and start dropping tables. It's possible that there were other ways in, but this would definitely be the quickest.

What that means is that the database server is not using a whitelist or VPN - it's just right out in the open for anyone with the right credentials to jump in and wreak havoc. This was a big disaster waiting to happen.

As soon as the staff learned that source code had leaked, they should have reacted immediately by changing passwords and limiting database access.

In the FAF thread, when someone pointed out that FA's history of insecurity is no secret and staff should have long ago allocated resources to setting up daily backups and a "full security audit" of their system, Dragoneer naturally passed off the blame to the ImageMadgick exploit. Yes, the same one that he JUST claimed had already been patched before the attack. ¯\_(ツ)_/¯

Reply

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <img> <b> <i> <s> <blockquote> <ul> <ol> <li> <table> <tr> <td> <th> <sub> <sup> <object> <embed> <h1> <h2> <h3> <h4> <h5> <h6> <dl> <dt> <dd> <param> <center> <strong> <q> <cite> <code> <em>
  • Lines and paragraphs break automatically.

More information about formatting options

CAPTCHA
This test is to prevent automated spam submissions.
Leave empty.