At the time of the last hacking incident, this was pretty much the only mirror of PE. Since then the textfile has been updated and includes some (hashed) answers.
Project Euler people, there's no shame in unbundling your problem set and your web app. Actually, those are two different projects, so unbundling them would be technically sweet. Release your problems on GitHub or wherever. Do the webapp as a related project.
keenerd, any chance you saved the HTML for the problems as well? If so could you release it? As nice as it is to have text versions of the problems, I'm suspicious some things were lost in the transition, e.g. if they used italics anywhere.
It's sad that someone would hack a site like this. The only thing they could possibly want are the email and password combinations. I hope they are stored in a secure way.
There are plenty of other motivations. It could be:
1) a novice hacker looking for experience
2) an automated bot that scanned IPs for some vulnerability and acted on its own when it found one
3) someone looking to extort the owner for money
4) someone with a personal vendetta against the owner
5) someone looking to secretly plant bitcoin mining software on the servers (who got caught)
6) someone looking to alter their own score to help them get some sort of math job
I could probably go on for a while, but you get the point. It's hard to ascribe intent to this sort of thing without more information.
As Project Euler is completely free and has a positive impact on the programming community, it would be very sad if the reasons for the hacking were 3) or 4).
I would discard 1) cause a real hacker, even if novice, would enter without damaging or stopping the service. He/She would maybe report to the owner the vulnerability or even would keep it secret.
It was posted elsewhere that visiting the hacked site triggered downloads of "flash_updater.exe" type trojans, so maybe one reason for the hack was to spread malware.
Think about agencies, not private actors — then this site makes a perfect target. Recruit and subvert are basic tasks for these agenices, and to do so you need information about the candidates. This website had probably a significantly higher proportion of interesting prospects.
Because a static HTML server can't be hacked unless there's some vulnerability in Nginx/Apache/whatever HTTP server (which are rare and a very big deal).
If this has happened before I don't see why they're not trying to take steps to avoid this in the future. I imagine their codebase ought to be inspected, if that was the root of both hacks. Otherwise, they should consider updating their systems more frequently. Maybe they should reach out to their community, it's a sizable site that could probably receive help to strengthen security. Ah well.
http://kmkeen.com/local-euler/
At the time of the last hacking incident, this was pretty much the only mirror of PE. Since then the textfile has been updated and includes some (hashed) answers.