4 replies
Hi,

It seems the intrusion attempts to my WP sites are on the increase, manifold.

Most of the IPs are coming from East Europe including Russia. The rest are from all over Western Europe, North Africa, South America, India, Pakistan and the USA. Strangely, very few attacks from China and none from Indonesia, Thailand, Malaysia, Singapore, Phillipines and Australia.

During the prolonged attacks, the IPs never changed. Some even attacked using the same IPs for over 400 times. If I let them be, I bet it will go on thousands of times from the same IPs before I put a stop to it.

As though they are using applications hidden somewhere in their web servers, without their Hosting Providers' knowledge. Some of the IPs are already blacklisted in major spam databases, yet they can still carry on. Are their ISPs so ignorant or sheer negligence? Or are their Hosting Providers and ISPs collaborating for some sort of amusement?

It must be a new game to them. Most of the time, they try Brute Force using username "admin" or "Admin". That's kiddy stuff for kiddy WP webmasters still using "admin" for admin roles.

But lately, intruders became even more determined and dangerous. They started to brute force using custom admin names. They will guess admin users based on domain names, user post names, names extracted from About Me pages and even unique names familiar only to local cultures. These vile intruders are doing more homework at google, fb search and whois.

I think it is time to put another layer of protection over the network to our sites, other than the predictable and mechanical WP security plugins.

Seeking your advice and opinion.
#attempts #hacking
  • {{ DiscussionBoard.errors[7868713].message }}
  • Profile picture of the author johnmags
    1. Use more complex usernames and passwords - combination of letters, characters, and numerals.
    2. Regularly change passwords.
    Signature
    Are you looking for a Professional Content Writer
    {{ DiscussionBoard.errors[7868997].message }}
  • Profile picture of the author OldLodgeSkins
    Hi,

    I don't use WP and I get WP-based attacks all the time... I know it simply because my 404 component sends me e-mail notifications when a 404 error is generated, and obviously since those guys try to attack WP files which of course don't exist in my website this generates 404s... It happens all the time and mostly from Ukraine. So every time I see an IP from that country I automatically get suspicious now...
    I get access attempts to WP's admin area but I also get script injection attempts, they are often hosted on Flickr.
    It has slowed down a little since I use a plug-in that checks every new visitor's IP against the Project Honeypot's database but there are still some that are unknown to them. Still, this has helped a lot in reducing the attacks. Give it a try - I'm sure a similar plug-in exists for WP. All you need it an account with https://www.projecthoneypot.org/home.php and then generate your free API key there.

    Seb.
    Signature
    Do you use Facebook ? Then you can make money just by inviting people to a Facebook group ! It's called the Instant Income System. How cool is that?
    {{ DiscussionBoard.errors[7869455].message }}
  • Profile picture of the author Kingfish85
    Originally Posted by azmanar View Post

    Hi,

    It seems the intrusion attempts to my WP sites are on the increase, manifold.

    Most of the IPs are coming from East Europe including Russia. The rest are from all over Western Europe, North Africa, South America, India, Pakistan and the USA. Strangely, very few attacks from China and none from Indonesia, Thailand, Malaysia, Singapore, Phillipines and Australia.

    During the prolonged attacks, the IPs never changed. Some even attacked using the same IPs for over 400 times. If I let them be, I bet it will go on thousands of times from the same IPs before I put a stop to it.

    As though they are using applications hidden somewhere in their web servers, without their Hosting Providers' knowledge. Some of the IPs are already blacklisted in major spam databases, yet they can still carry on. Are their ISPs so ignorant or sheer negligence? Or are their Hosting Providers and ISPs collaborating for some sort of amusement?

    It must be a new game to them. Most of the time, they try Brute Force using username "admin" or "Admin". That's kiddy stuff for kiddy WP webmasters still using "admin" for admin roles.

    But lately, intruders became even more determined and dangerous. They started to brute force using custom admin names. They will guess admin users based on domain names, user post names, names extracted from About Me pages and even unique names familiar only to local cultures. These vile intruders are doing more homework at google, fb search and whois.

    I think it is time to put another layer of protection over the network to our sites, other than the predictable and mechanical WP security plugins.

    Seeking your advice and opinion.
    Azmanar - we've got a starter guide on WP security found here on our blog: Securing Wordpress - A Definitive guide to Wordpress Security Tips—LiquiLayer Technologies – Web Hosting & Solutions

    I'd also recommend looking at CloudFlare OR Incapsula. We're a partner with both companies & these are easily accessible from inside your cPanel for each account.

    In addition to that, you can password protect the wp-admin directory (this is noted in our guide).

    If the IP addresses or netblocks are the same, you can submit them under our abuse department for evaluation of being blocked at the server level. We can also track down where these tools are being hosted & make contact with the hosts/datacenters.

    As always, let me know if you have any questions either via pm, email or through your account with us.

    Thanks,
    Brent
    Signature

    |~| VeeroTech Hosting - sales @ veerotech.net
    |~| High Performance CloudLinux & LiteSpeed Powered Web Hosting
    |~| cPanel & WHM - Softaculous - Website Builder - R1Soft - SpamExperts
    |~| Visit us @veerotech Facebook - Twitter - LinkedIn

    {{ DiscussionBoard.errors[7869533].message }}

Trending Topics