The Princeton "University Database" that was hacked is a privately maintained Alumni Association site from the UK. It is not on the Princeton domain or associated with the University at all.<p>Here's an excerpt:
"Come out and suppoert Chickenshed, an inclusive theatre company based in London that brings people of all ages, backgrounds and abilities together to create groundbreaking and exciting new theatre."<p>Time will tell how the world will change now that this sensitive information is out in the open.
Yawn, more script kiddie antics against arbitrary targets masquerading as political activism. Maybe I'm missing something, but I don't see how this "raises awareness" about anything except TeamGhostShell's ability to do mass SQL injection.
Looks like they went for the low hanging fruit. At my university, I only see wordpress and other massively popular PHP tools. Script kiddies are at it again.<p>Though, there was one database (at my school) with the passwords in plaintext. Why do people use plain text for passwords. Why.
So, you took publicly available info and dumped it out to as SQL select statements. What's the point exactly? There are a couple of admin users/passes scattered in, but it would appear just gives access to said user updating said public content like vacancies, course descriptions, etc.