Interesting how no one mentioned what kind of vulnerability or exploit was used to "hack" the website. If they released that information, it'd bring the credibility of their story up, even if it is just by 5%.
IF the site
WAS "hacked", let's assume that the password was brute forced. A simple google search led me to the email Query value:
admin@bitfinex.com (email). Seeing as blog.bitfinex.com runs WordPress, I ran a few tests.
Firstly, user enumeration is possible. I tested it with two, but:
ID User Login
1 admin admin
If one was to brute force, they'd add admin into the &username= part of their brute force query.
---
HAHAHA I FOUND A VULNERABILITY IN THE WEBSITE. IT'S AN SQLI VULNERABILITY.
you won't see anything like that from Bitfinex. They are just a gang of scammers. They manipulated the market, inside traders, blocked client's accounts and so on... Yes, there are so many idiots to accept their shits

you can see how many of the Bitfinex's clients are saying THANKS that Bitfinex found a miraculous solution : a cut of 36% + shit tokens while Bitfinex earned over 25 MIL USD
