Was more like an exploit of bug. Not a real hacking. But yes, is a very good example, you mentioned.