Oracle's MySQL.com hacked via SQL injection

Share this article:

Updated Monday, March 28, 2011 at 5:56 p.m. EST 

Hackers over the weekend compromised Oracle's MySQL.com customer website via SQL injection and posted a list of usernames and passwords online.

Two Romanian hackers using the aliases “TinKode” and “NeOh” have taken responsibility for the attack and said they exploited an SQL injection flaw to break into the web servers hosting MySQL.com, a website for the popular open source database product.

The site was first outed as vulnerable in a Sunday post to the Full Disclosure mailing list by a user with the alias “Jackh4xor,” who included a list of MySQL.com internal databases and tables along with usernames and password hashes.

Later on Sunday, TinKode and NeOh posted a dump of information extracted from MySQL, including the cracked passwords of users, to the text-sharing site Pastebin.

In an accompanying blog post, TinKode said he and NeOh had discovered the vulnerability in January. Their information dump included account credentials for two former MySQL employees – former Director of Product Management Robin Schumacher, whose password was a four-digit number, and former Vice President of Community Relations Kaj Arnö.

The hackers also on Sunday admitted to attacking Oracle's Sun Microsystems website, Sun.com, via SQL injection. They posted tables and email addresses, but no passwords, extracted from Sun.com.

Oracle obtained both affected domains, Sun.com and MySQL.com, with its acquisition of Sun.

“It does not appear to be a vulnerability in the MySQL software, but rather flaws in the implementation of their websites,” Chester Wisniewski, senior security adviser at anti-virus firm Sophos, wrote in a blog post Monday. “Auditing your websites for SQL injection is an essential practice, as well as using secure passwords.”

An Oracle spokeswoman told SCMagazineUS.com in an email Monday that the company is investigating the incident to determine which systems and data are affected.

Researchers, meanwhile, are advising MySQL users to exercise caution in light of the incident.

“If you have an account on MySQL.com, we recommend changing your passwords ASAP (especially if you like to reuse them across multiple sites),” David Dede, lead security researcher at Sucuri Security, a malware detection solutions provider, wrote in a blog post Sunday.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.