Sebastian,
Sad, but true! I removed the Install pages on 3 July 2016, but it was too late - the hack occurred on 30 June 2016
Using an Atlanta,GA IP address, hacker ran an install of "7.4.2.1" which replaced \default.aspx, added aspx pages to portals\_default\Smileys and created new host account and made the following host setting changes:
Search_Author_Boost 15
Search_Content_Boost 35
Search_Description_Boost 20
Search_Tag_Boost 40
Search_AllowLeadingWildcard N
Search_Title_Boost 50
AdminMembershipResetLinkValidity 1440
SSLDomain
UpgradeForceSSL N
SMTPMaxIdleTime 0
SMTPConnectionLimit 1
WebRequestTimeout 10000
ProxyPort -1
DemoPeriod -1
These setting seem ok / benign to me - should I change any of them?
I believe I have remedied the other hacks - for sure that mysterious JavaScript is now gone and the user that reported the issue no longer gets a warning from his AV.
I can't say enough good things about the support here and the Security Analyzer. Awesome. That should pinned be on the Host's favorites by default.
Thanks,
Scott