Wordpress Sites Under Wide-Scale Brute Force Attack 110
New submitter NitzJaaron writes "Some of us have been experiencing attacks on Wordpress sites for the last few days, but it's now beginning to be widely reported that there's a fairly large brute force attack happening on Wordpress users on multiple hosts, including HostGator and LiquidWeb. 'This attack is well organized and again very, very distributed; we have seen over 90,000 IP addresses involved in this attack.' CloudFlare has announced that they're giving all users (free and paid) protection from said attacks with their services. 'The attacker is brute force attacking the WordPress administrative portals, using the username "admin" and trying thousands of passwords.'"
Further reports available from Immotion hosting and Melbourne server hosting.
Seems like..... (Score:3, Insightful)
Re:Seems like..... (Score:5, Informative)
Re: (Score:2)
Based on the dictionary they're using for this attack, all that's required to thwart it is a capital letter.
Re: (Score:2)
Doesn't WP allow you to change the admin login URL as well?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Which of course, you should never do, since .htaccess will grind the performance of your site directly into the ground. It also means that anyone with access to the filessytem (such as an already-hacked WP instance) can revert your changes.
http://httpd.apache.org/docs/2.2/en/howto/htaccess.html#when [apache.org]
Re:Seems like..... (Score:5, Informative)
No, the wp-admin folder is rather hard coded.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Seems like..... (Score:4, Informative)
Re: (Score:1)
And it's another reason to temporarily lock out an account from logging in, if there's too many wrong guesses at the password in a very short period of time. There might be a Wordpress plug-in for something like that, but I don't think it's in Wordpress's core, and it really should be in the core of any web system. It adds tons of security all by itself.
There are indeed plugins that do this. In fact, I was alerted to a few of my sites being bruteforced from a plugin that does just that. What really helps though, is having a .htpasswd enabled on the wp-admin directory -- I use a plugin for that as well ("AskApache Password Protect"), though admittedly it's not hard at all to implement without the plugin.
Re: (Score:2)
You should not use plugins to regulate login attempts, at this time. Check the post, below and link to his blog with the reasons why. http://it.slashdot.org/comments.pl?sid=3643255&cid=43436363 [slashdot.org]
I'd also recommend that people reset their Secret Keys to resalt users' cookies. https://codex.wordpress.org/Editing_wp-config.php#Security_Keys [wordpress.org]
Re: (Score:1)
Re: (Score:2)
Apocalypse Meow: http://wordpress.org/extend/plugins/Apocalypse-Meow
It will not only lock users out if they fail to log in a certain number of times (defined by you but default is 5), but it can remove the meta data that tells people which version of Wordpress you're running (nothing like saying "Hey, hackers, attack me in this manner"), can rename the "admin" account easily, prevent direct PHP script execution of plugins (which might break some plugins so use with caution) and even keeps a log of failed lo
Re: (Score:1)
Re: (Score:2)
Dictionary attack fails due to time constraints as the complexity is just as great for completely mixed characters as for a pass phrase as you must guess all the words simultaneously rather than solve one word at a time. Pass phrase is quite simply the best realistic solution as it provides plenty of characters while being easy to remember and from the outside it is still unknown whether you are using any other characters in the pass word hence they still must be checked and PS spaces are never used is pas
Re: (Score:2)
Passphrase? Cracking it is called a dictionary attack, it's what almost every password cracking attempt uses anyway. It's just a list of words run against the password, and can be rather easy to crack. SAFE passwords are long enough series of random letters numbers and symbols, something an attempt would have to brute force character by character and thus wouldn't have much of a chance of getting. $57*ghU^61@nm is a far safer password that "Correct Horse Staple Battery" which would easily be crackable in a reasonable timeframe. Unfortunately $57*ghU^61@nm is friggen hard to remember. Maybe it's time to find convenient and cheap biometric scanners.
I think you misunderstand. A brute-force attack on a password is "just" a dictionary attack using letters and symbols as your dictionary instead of English words. There's realistically 26 lower case letters, 26 upper case letters, 10 digits, around 32 symbols, and space (just looking at my keyboard), giving us a set of about 95 to compose our passwords from. According to Oxford Dictionaries [oxforddictionaries.com] there's around 171,476 words in current usage. Even if you constrain to what the average person knows, you've got anyw
Re: (Score:2)
Good advice.
But really, there just shouldn't be a default username: you should have to enter your own. This has been standard practice for decades.
Though I have to concede it works pretty well, WP is truly awful: a tiny bit object-oriented here, a bit finite state machine there; no coherent design at all.
It's kind-of the PHP of PHP software: Crufty, inelegant, painful to develop with, yet also ubiquitous and loved by clients, who ask for it by name.
WordPress needs a 100% rewrite by someone who has read a bo
really? (Score:2)
Re: (Score:1)
What's new is the gigantic scale of it, nothing more. It appears to be one humongous distributed brute-force attack with the power to quite easily take down a server. This is not your average Wordpress brute-force attack.
Re: (Score:1)
Re: (Score:1)
What is new is that these attempts are coming from so many IP's simultaneously that it's crashing servers.
limit login attempts (Score:5, Insightful)
advising all our clients who use WordPress to install an additional plugin 'Limit Login Attempts' that will help to prevent brute force attacks
Not being familiar with wordpress, I'll ask why isn't that on by default?
Re:limit login attempts (Score:5, Insightful)
Because it increases the number of support requests dramatically.
Re: (Score:2)
Re: (Score:1)
Same basic answer: Because it increases the number of support requests dramatically.
Re:limit login attempts (Score:4, Insightful)
>>advising all our clients who use WordPress to install an additional plugin 'Limit Login Attempts' that will help to prevent brute force attacks
> Not being familiar with wordpress, I'll ask why isn't that on by default?
What could be a simpler way to deny an administrator access to his own account than by a "limit login attempts" that limits attempts on a per-account basis (vs a per-IP address basis)?
And if the attack is "one attempt per site per zombie", limiting on a per-IP basis has no teeth.
<ignorant_speculation>Of course, if you have created an admin account that's not NAMED admin, you won't be locked out. And if you change the account named "admin" to having lower privileges, even better.</ignorant_speculation>
Re: (Score:1)
Re: (Score:2)
Apparently there are over 90,000 IPs involved in the attacks, so they can effectively test a 90,000 password dictionary before you even see the same IP twice.
Re: (Score:1)
Re: (Score:2)
In order to brute force a password, you would need to hit the site multiple times from each ip. Every ipv4 address in existance (count ips that are not valid like 127.0.0.0) with one guess a piece gives 2^32 guesses. a 6 character alphanumeric password has over 13 times as many possibilities.
Captcha's (Score:1)
Little do they know... (Score:1)
Re:Little do they know... (Score:5, Funny)
That's why I changed mine from username 'admin' with a blank password to password 'admin' with a blank username. They'll never guess that one!
Re: (Score:1)
Re: (Score:1)
I use eight asterisks as my password. That way I can see it when I type it in.
Re: (Score:2)
Why would an ISP such as Comcrap want to block the account of a paying client? Most don't care about massive HTTP request.
Admin wasn't just the default password (Score:3)
I wonder what they're doing this for? What does blowing up a planet's worth of little blogs get anyone? Does anyone know what this thing actually does?
Re:Admin wasn't just the default username (Score:2)
Re: (Score:3)
Re: (Score:1)
What I think you are referring to is the unique authentication keys and salts. I have had to (reluctantly) fix a client's hacked site because they had set it up without them.
If there's any newbies here, make sure you replace (WP provides a random generator) the definitions below in wp-config.php:
*
* Change these to different unique p
Re: (Score:2)
Not exactly what I was meaning...but definitely important.
What I was actually meaning was that the important thing to take out of this is that the wordpress attacks are a smoke screen, a stepping stone, one gear in a machine rolling towards some unknown destination. Whoever is behind this has a plan beyond hacking blogs. The power available to them with this number of compromised machines is vast. Whatever their target is, it's going to get hit really hard.
I'd be interested in seeing someone do a code ana
Re: (Score:2)
A cleaner internet?
Re: (Score:1)
Re: (Score:2)
How to Respond to the Global Wordpress Attacks (Score:3, Interesting)
Re: (Score:3, Informative)
The useful part of that blog post seems to be:
RewriteEngine on
RewriteCond %{REQUEST_METHOD} =POST
RewriteCond %{HTTP_REFERER} !^http://(.*)?.example.com [NC]
RewriteCond %{REQUEST_URI} ^/wp-login\.php(.*)$ [OR]
RewriteCond %{REQUEST_URI} ^/wp-admin$
RewriteRule ^(.*)$ - [R=403,L]
(The logic makes sense. I haven't tested the syntax yet)
It also suggests an insane 30-character password abomination:
for example the relatively strong password: th1$l1ttl3p1ggy$3cur3dth31rW0rdpr3$$$1t3 is simply "thislittlepiggysecuredtheirWordpresssite" with i->1, s->$, e=3, and o->0 (zero)
I prefer "wrong chicken battery staple [xkcd.com]", which is probably not in attacker's dictionnary.
Re: (Score:1, Interesting)
Re: (Score:2)
any password under 50 characters made of only lowercase letters will be broken by the most basic brute force.
The fact that the password is only lowercase letters is immaterial for a brute force attack. Unless the attacker already knows that the password is only lowercase letters, they will try guesses with numerals and symbols. It is very hard to imagine a brute force attack that would try every combination of lowercase letters up to 50 characters without trying anything with uppercase, numerals, or symbols, but even if they do it isn't a reason to worry.
If they did try to brute force just lowercase, there are 5
Re: (Score:2)
The thing is, they won't be using a pure brute force but rather a 'directed' brute force through some sort of markov-chain implementation. So if you use standard English words and grammar the number of bits of random data in your password is dramatically reduced.
Re: (Score:2)
You mean "correct horse battery staple"
.
No, I meant another animal, just in case the person who did the dictionary is an xkcd fan, and put that in for fun.
But for the number of characters, I think you may have to revisit your math, as other have already pointed out. And this is an online attack, which severely limits the speed anyway (not the speed of trying, but the speed of getting a reply from the server).
A space in the username (Score:1)
Themes, plugins and .htacess... (Score:2)
Many WP attackers probe for themes and plugins with known weaknesses, or exploit the upload system to upload executables. But what most people don't know (including most WP developers I've worked with) is that
Lack of security in Wordpress (Score:1)
The root cause of this attack is that Wordpress allows unlimited login attempts for the admin account. I know there is some plugin that can fix it, but it should be built into the core.
Re: (Score:2)
MY ISP got hacked... (Score:3)
Off topic (Score:2)
Re: Off topic (Score:2)
Re: (Score:2)
Re: (Score:1)
Exactly. Sounds like a 14-year-old on a power trip. No worries, there will be a few companies that may hire him as a white hat. That is, if he's sm
Re: MY ISP got hacked... (Score:2)
Disable the usual admin interface (Score:2)
I ended up making some tiny changes to my WP install that basically causes requests to /wp-admin to die immediately, unless you're accessing it via a specific HTTP port that I've opened in Apache specifically for this purpose.
I've got disk permissions set up so that the regular Apache user cannot write at all to the disk - a common source of WP problems seems to be exploits writing new files to disk, so stopping that seemed like a good idea. Unfortunately it also bones a lot of WP functionality like being a
Re: (Score:1)
Someone more informed can correct me, but that to me sounds like you having said to never use root. To not use admin as a general rule sounds like cutting off the nose to spite the face. Not to mention that it's impractical.
If you have to come to the decision in excluding admin, then you probably have more issues and security policies that you need to focus on.
missing info (Score:1)
Spam disguised as a Slashdot Article... (Score:1)
Re: (Score:1)
Yes, god forbid.
Nobody gives a shit about your crappy blog, but they will give a shit about your crappy forms that allow massive amounts of spam to be sent out.
Though admittedly, you usually don't need to brute force your way in for that.
Re: (Score:2)
Re: (Score:3)
The no remote admin access makes sense for a computer login, but for a web-based app like WordPress often run on a remote hosting account there's no such thing as "local" access. Or I suppose there is, but most users don't have access to the host server and wouldn't know how to use it even if they did.
Re: (Score:1)
> but for a web-based app like WordPress often run on a remote hosting account there's no such thing as "local" access
SSH tunnels.
Re: (Score:2)
Great! Now all I have to do is compromise your user account, add some aliases to your .bashrc, and I get promoted to root.
Re: (Score:1)
And how will you do that if you don't know my regular username or password? All you've done is turn an easy problem (brute force guess the password for the known account "root"), into a harder problem (guessing both my username and password, and then guessing the root one or sneaking something into an alias and hoping I invoke it during an "su" or "sudo"). If you're talking about some other way to compromise the system, then the account name/pass is irrelevant.
All I'm saying is, these guys are apparently
Re: (Score:1)