Admin password spells trouble in recent WordPress attacks

WordPress
(Phys.org) —Sources from several Web hosting services this week raised an all-out alert: WordPress was under attack with at least 90,000 IP addresses involved to brute-force crack credentials of WordPress sites. The attacks, they said, are worrying in that they are on an unusually large scale, being described as "superbotnet" level. Among hosting providers detecting such attacks were CloudFlare and HostGator. "The attacker is brute force attacking the WordPress administrative portals, using the username 'admin' and trying thousands of passwords," Matthew Prince, CEO of CloudFlare, said in an April 11 blog posting.

Such attacks can result in the commandeering of servers that run the WordPress application. Might the attackers be in the process of building a strong, destructive botnet of infected computers? Prince added in his blog, "One of the concerns of an attack like this is that the is using a relatively weak botnet of home PCs in order to build a much larger botnet of beefy servers in preparation for a future attack."

The well organized, distributed attacks try to brute force the administrative of WordPress servers, employing the username "admin" and 1,000 or so common . At least 90,000 IP addresses hit WordPress machines hosted by one hosting provider. "We have seen over 90,000 IP addresses involved in this attack," wrote Sean Valant of HostGator, in his April 11 blog posting. After a main force of the attack, signs were that it had died off, but then picked up again, he added.

On April 12, founding developer of WordPress, Matthew Mullenweg, took to his blog to relay his take and his recommendations:

"Almost three years ago we released a version of WordPress (3.0) that allowed you to pick a custom username on installation, which largely ended people using "admin" as their default username. Right now there's a botnet going around all of the WordPresses it can find trying to login with the 'admin' username and a bunch of common passwords, and it has turned into a news story (especially from companies that sell 'solutions' to the problem)."

Mullenweg recommended that users check to see if they are up to date with the latest versions of WordPress. In addition, those who still had "admin" as a username should proceed to change it, and to create a strong password. Also, he recommended that those on WP.com turn on two-factor authentication.

Mullenweg stated that, outside, some other pieces of advice users might hear about what to do were not so great. "Supposedly this has over 90,000 IP addresses, so an IP limiting or login throttling plugin isn't going to be great (they could try from a different IP a second for 24 hours)."

HostGator's Valant similarly noted the value of using a secure password. "We highly recommend you log into any WordPress installation you have and change the password to something that meets the security requirements specified on the WordPress website," he said. "These requirements are fairly typical of a secure password: upper and lowercase letters, at least eight characters long, and including 'special' characters (^%$#@*)."


Explore further

WordPress back up after attacks 'from China'

© 2013 Phys.org

Citation: Admin password spells trouble in recent WordPress attacks (2013, April 14) retrieved 16 June 2019 from https://phys.org/news/2013-04-admin-password-wordpress.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
0 shares

Feedback to editors

User comments

Apr 14, 2013
the solution would be another username than "admin" being the admin

Apr 14, 2013
This comment has been removed by a moderator.

Apr 14, 2013
This comment has been removed by a moderator.

Apr 14, 2013
just use your brain.....morons

Apr 15, 2013
Hey,

I am a victim. How do i get rid of the hackers content, I cannot find it anywhere on the HTML code.

Please help!

Thanks.

Apr 15, 2013
Anyone care to set up a tarpit and report on what these guys are trying to do once they break in?

Apr 15, 2013
Rather than tarpit, did you mean to use the word honeypot?

Apr 15, 2013
lt's to simple to just blame it solely on the users or admins. Obviously, Word press neglected to ENFORCE a strong username and password policy!

Apr 17, 2013
Wordpress or any other system should force the user to change username and password. This will ensure username/password guessing will be more laborious.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more