We’d like to remind Forumites to please avoid political debate on the Forum.
This is to keep it a safe and useful space for MoneySaving discussions. Threads that are – or become – political in nature may be removed in line with the Forum’s rules. Thank you for your understanding.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
The Forum now has a brand new text editor, adding a bunch of handy features to use when creating posts. Read more in our how-to guide
Wordpress getting hit hard - secure yourselves!
Benet
Posts: 284 Forumite
Hey folks,
I know a good load of you run Wordpress on your business sites and maybe even for blogs and personal projects, so...
Just a little heads up for anyone running Wordpress, that there's a massive distributed attack going on at the minute. Basically, the attacker is brute force attacking the WordPress administrative portals, using the username "admin" and trying thousands of passwords.
http://krebsonsecurity.com/2013/04/brute-force-attacks-build-wordpress-botnet/
The above article has some handy hints on securing yourself from these attacks. Most of it is pretty common sense stuff, but well worth a read
I know a good load of you run Wordpress on your business sites and maybe even for blogs and personal projects, so...
Just a little heads up for anyone running Wordpress, that there's a massive distributed attack going on at the minute. Basically, the attacker is brute force attacking the WordPress administrative portals, using the username "admin" and trying thousands of passwords.
http://krebsonsecurity.com/2013/04/brute-force-attacks-build-wordpress-botnet/
The above article has some handy hints on securing yourself from these attacks. Most of it is pretty common sense stuff, but well worth a read
0
Comments
-
Hey folks,
I know a good load of you run Wordpress on your business sites and maybe even for blogs and personal projects, so...
Just a little heads up for anyone running Wordpress, that there's a massive distributed attack going on at the minute. Basically, the attacker is brute force attacking the WordPress administrative portals, using the username "admin" and trying thousands of passwords.
http://krebsonsecurity.com/2013/04/brute-force-attacks-build-wordpress-botnet/
The above article has some handy hints on securing yourself from these attacks. Most of it is pretty common sense stuff, but well worth a read
The plugin "limit login attempts" is very useful. It locks the pesky kids out for the number of hours you set and also emails you so you know you are being attacked.0 -
I have several WP sites but on my own server so doubt I'll see this attack but that plugin looks pretty much essential anyway so thanks both.0
-
Thanks for the info0
-
The plugin "limit login attempts" is very useful. It locks the pesky kids out for the number of hours you set and also emails you so you know you are being attacked.
This the plugin you mean?
wordpress.org/extend/plugins/limit-login-attempts/
(sorry can't post links yet as I'm a new user!)0 -
Caught one already. eMail from that excellent plugin...16 failed login attempts (4 lockout(s)) from IP: 66.85.172.250
Last user attempted: admin
IP was blocked for 24 hours0 -
kwikbreaks wrote: »Caught one already. eMail from that excellent plugin...
I would increase the lockout period and drop them down to 2 attempts so they don't have a chance of either guessing your password or your username.0 -
I use one called Login Lockdown to restrict number of attempts. No one should use the username "admin" as in the article as it just means they are halfway there with getting into your site.0
-
Thanks for this, just installed that plug-in and tightened the number of attempts etc :-)0
-
I amended the defaults on that site to less short lockouts before 24 hour lockout. Now I've had a notification of a lockout on a different site and they seemed to be using random ids. I wasn't using admin anyway but one admin user would have been easy to guess so removed that now.I would increase the lockout period and drop them down to 2 attempts so they don't have a chance of either guessing your password or your username.
According to IP lookup the first was in USA and this one is Poland so they are probably using an anonymous proxy making the lockouts pretty pointless16 failed login attempts (4 lockout(s)) from IP: 91.239.66.72
Last user attempted: k4dskzww
IP was blocked for 24 hours
0
This discussion has been closed.
Confirm your email address to Create Threads and Reply
Categories
- All Categories
- 353.5K Banking & Borrowing
- 254.1K Reduce Debt & Boost Income
- 455K Spending & Discounts
- 246.6K Work, Benefits & Business
- 602.9K Mortgages, Homes & Bills
- 178K Life & Family
- 260.5K Travel & Transport
- 1.5M Hobbies & Leisure
- 16K Discuss & Feedback
- 37.7K Read-Only Boards