Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Botnet Cloud The Internet

Wordpress Sites Under Wide-Scale Brute Force Attack 110

New submitter NitzJaaron writes "Some of us have been experiencing attacks on Wordpress sites for the last few days, but it's now beginning to be widely reported that there's a fairly large brute force attack happening on Wordpress users on multiple hosts, including HostGator and LiquidWeb. 'This attack is well organized and again very, very distributed; we have seen over 90,000 IP addresses involved in this attack.' CloudFlare has announced that they're giving all users (free and paid) protection from said attacks with their services. 'The attacker is brute force attacking the WordPress administrative portals, using the username "admin" and trying thousands of passwords.'" Further reports available from Immotion hosting and Melbourne server hosting.
This discussion has been archived. No new comments can be posted.

Wordpress Sites Under Wide-Scale Brute Force Attack

Comments Filter:
  • Seems like..... (Score:3, Insightful)

    by n3tm0nk ( 2725243 ) on Friday April 12, 2013 @04:38PM (#43435545)
    something they should have been prepared for in the first place......
  • by interkin3tic ( 1469267 ) on Friday April 12, 2013 @04:42PM (#43435589)

    advising all our clients who use WordPress to install an additional plugin 'Limit Login Attempts' that will help to prevent brute force attacks

    Not being familiar with wordpress, I'll ask why isn't that on by default?

  • by preaction ( 1526109 ) on Friday April 12, 2013 @04:54PM (#43435713)

    Because it increases the number of support requests dramatically.

  • by sabt-pestnu ( 967671 ) on Friday April 12, 2013 @05:00PM (#43435783)

    >>advising all our clients who use WordPress to install an additional plugin 'Limit Login Attempts' that will help to prevent brute force attacks

    > Not being familiar with wordpress, I'll ask why isn't that on by default?

    What could be a simpler way to deny an administrator access to his own account than by a "limit login attempts" that limits attempts on a per-account basis (vs a per-IP address basis)?

    And if the attack is "one attempt per site per zombie", limiting on a per-IP basis has no teeth.

    <ignorant_speculation>Of course, if you have created an admin account that's not NAMED admin, you won't be locked out. And if you change the account named "admin" to having lower privileges, even better.</ignorant_speculation>

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...