| http://www.w3.org/ns/prov#value | - The server didn't house any critical data and wasn't particularly important to the organization, and the exploit wasn't particularly impressive, either; the attackers found a SQL injection vulnerability and then used an xp_cmdshell function to pull down their tools to get a foothold onto the server.
|