geocom:jarledb:
I would not be surprised if their API allowed something like
example.com/url/customerid=1
And then access to user data. And that it was easy for "the hacker" to just set up a script to run through any possible combination and store that data.
From what I read of it, it sounded far more likely that the vector app was requesting a list of unconfirmed power outages and it was giving as a list(json, xml etc) with all of the information provided by the user instead of just say a location.
I could be wrong as I have not seen the actual data but from what was explained in the article that was the impression I got.
As is my impression, which would also explain why with the amount of load it was falling over.
Biggest complaint around the office i heard was, "it wont load unless i'm on LTE"