On Tue, 2015-04-07 at 12:28 -0400, m.roth@5-cent.us wrote:
“It is the assessment of Linux Australia that the individual utilized a currently unknown vulnerability to trigger a remote buffer overflow and gain root level access to the server,” Hesketh wrote.
The attacker installed a remote access tool and then botnet command and control software. --- end excerpt ---
http://www.cio.com/article/2906814/linux-australia-breached-personal-details-leaked.html
Its stupid and unprofessional to store personal data on a public accessible server when there is no current public requirement for that data.
How do these people ever become 'konputar xperts' ?
I would like to know what operating system was used and the method used to gain access.