507
Internet Archive breached again through stolen access tokens
(www.bleepingcomputer.com)
This is a most excellent place for technology news and articles.
I guess this is an attempt to discredit them.
After working at many, many companies, security is usually very bad. This is typical. Not changing access tokens is also very common.
Discrediting someone usually has a goal of pushing customers to another source though. There is no other source of this information, so what would be the point?
Destroy a source of historical documents so that the past can be contested. Sow doubt, confusion, deniability. Hide evidence of past crimes, or inconvenient documents. Plant documents, etc.
He who controls the past controls the future, he who controls the present controls the past.