Following an embarrassing leak of its proprietary software over a file transfer protocol site last January, the inner workings of Diebold Election Systems have again been laid bare.
A hacker has come forward with evidence that he broke the security of a private Web server operated by the embattled e-vote vendor, and made off last spring with Diebold's internal discussion-list archives, a software bug database and more software.
The unidentified attacker provided Wired News with an archive containing 1.8 GB of files apparently taken March 2 from a site referred to by the Ohio-based company as its "staff website."
<snip>
The anonymous attacker said he broke into the Diebold staff site, which was located at
https://staff.dieboldes.com, after reading in January about how unauthorized outsiders had copied source code and documentation from an insecure FTP site operated by the company at the Internet address ftp://ftp.gesn.com.
"In a few short minutes I had access to their replacement for the FTP site, their 'secure' web," wrote the hacker.
http://www.wired.com/news/privacy/0,1848,59925,00.html