I have seen that before. It looks weird, why do they need all that info?
Maybe they were hoping that whoever took the server down this time would submit their confact info.
With vBulletin being so oriented on transparency I'm sure we'll find out soon.Are we sure it was a hacking attempt though? I just surfed to vB.org and wasn't logged out. They've not instituted a forced password reset as they generally do after a hacking attempt... It could have simply been a server issue? Or ... maybe not?...
That would be the same for everyone I think.For people that want to see if details have been taken https://haveibeenpwned.com/ Also it checks for other websites to LinkedIn, Adobe, Ownedcore. This is the full list https://haveibeenpwned.com/PwnedWebsites
My details taken from vBulletin:
vBulletin: In November 2015, the forum software maker vBulletin suffered a serious data breach. The attack lead to the release of both forum user and customer accounts totalling almost 519k records. The breach included email addresses, birth dates, security questions and answers for customers and salted hashes of passwords for both sources.
Compromised data: Dates of birth, Email addresses, Homepage URLs, Instant messenger identities, IP addresses, Passwords, Security questions and answers, Spoken languages, Website activity
I got 6Twice for me, once at vBulletin and the other with Adobe. The Adobe hack was of no consequence because I registered with disposable details but vBulletin was another matter. That compromise taught me a valuable lesson, to never again submit so much personal data to a website.