I was checking some logs over at villavu.com today and found that someone did a similar hack on villavu.com forums. (E: Including, most likely - a database dump)
While the hackers used tor in most cases, Nielsie95 and I managed to find a few IP’s that are definitely from the hack, but aren’t using tor.
Facts:
[ul][] After the initial hack, the account “super_” was given lots of access, and a reputation power of 13k+.
[] One of the IP’s used in the AdminCP match super_‘s IRC logins. ( https://encrypted.google.com/search?q=pool-173-65-194-148.tampfl.fios.verizon.net )
[*] One of my fellow admins’ password was somehow retrieved, used to access the admincp. Apparently the HTTP auth (extra auth) was also compromised, perhaps the password of the admin was the same - this seems like the only possibility. After that, he changed the password of an admin with access to vBulletin plugins (the account was unfortunately mutable) (the ones where you can edit php code of plugins… directly in the admincp). After that a simple shell script was edited into the plugin.[/ul]
E: This all took place 3 and 4 September.