Oracle's MySQL.com customer website was apparently compromised over the weekend by a pair of hackers who publicly posted usernames, and in some cases passwords, of the site's users.
Taking credit for the hack were "TinKode" and "Ne0h," who wrote that the hack resulted from a SQL injection attack that they did not provide further details on. The vulnerable domains were listed as www.mysql.com, www.mysql.fr, www.mysql.de, www.mysql.it and www-jp.mysql.com.
[ Learn how to greatly reduce the threat of malicious attacks with InfoWorld's Insider Threat Deep Dive PDF special report. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]
According to a post on the Full Disclosure bug mailing list on Sunday, MySQL.com ran a variety of internal databases on an Apache web server. The information posted included a raft of password hashes, some of which have now been cracked.
Among the credentials in a dump of the information posted on Pastebin were passwords for a number of MySQL database users on the server, and the admin passwords for the corporate blogs of two former MySQL employees. The bloggers were former director of product management Robin Schumacher, and former vice-president of community relations, Kaj Arnö. Schumacher is now director of product strategy at EnterpriseDB, while Arnö is now executive vice president for products at SkySQL. Schumacher's blog had not been touched since June 2009, Arnö's not since January 2010.
Oracle, which took control of MySQL with its acquisition of Sun Microsystems in April 2009, did not have an immediate comment.
A security company that monitors websites for hacking attacks, Sucuri, advised users with an account on MySQL.com to change their passwords as soon as possible, especially if they use the same passwords across multiple sites.