I don’t know for certain, not op, but sounds like since they pushed the env file, it may have been accessible via URI and since it had all the credentials and host info to access the database, thats all the attacker messed with... and that is more than enough.
ngranja19|6 years ago
gentleman11|6 years ago
Is there an automated strategy that protects against slipups like this?