>So far, I've seen on this list three theories on what the perpetrators
>call themselves (MGM/UA, ILF, PLA) and three theories on how they did
My understanding is MGM/UA still have root access to the files. Panic!
>it (world read/write-mountable file system, sendmail, httpd). If I
>were trying to get hard numbers for risk assessment, I'd be lost. Can
>anyone identify someone personally involved in the details of the
>incident, and produce a statement from them? Thanks,