What kind of attack was used to gain access to the Second Life databases? Has the identity of the attacker been established?
We have gathered a significant amount of information regarding the attack and the attacker. However, because the investigation is ongoing, we cannot provide very detailed information regarding the type of attack or identity of the attacker. We can disclose that the intrusion path took advantage of a “zero-day exploit” in third-party web software.