SD hack

As an information security professional, I’ve responded to such events, I’ve read very few reports from others who have had their systems compromised.
Such information is extremely helpful in preventing such compromises in others systems and enterprises.

It would be greatly appreciated if the Straight Dope could be given in regards to this compromise, once, of course, the investigation is complete.
Information such as length of compromise, the method utilized to compromise SD systems and similar information would go far in helping others prevent the same thing happening to them.

Thank you in advance, I sincerely hope that recovery was straightforward.

Reported for forum change (or a request for a link to the column that this has anything to do with).

This is better suited to ATMB than the Comments forum.