The hack apparently used stolen network admin credentials to get going. Once you have a set of those, any target OS is pretty much toast.