Check the question again. Didn't say what. But how.
That is known. And they say it again in the link you gave:
At this point in time we still do not know what the initial attack vector is – it is unknown how the attackers get root access on the compromised servers