Gibson Index

2013-04-15: WordPress Installations Targeted by Automated Brute-Force Attack

Level Two Attack

Thousands of WordPress installations are allegedly at risk from an automated botnet that attempts to guess passwords for administration accounts. Like many web applications, WordPress does not perform failed-login-throttling by default - this means that automated tools can make as many attempts to guess passwords as the network connection can handle. Someone has built a tool that can do this automatically, and it appears to leverage each successful compromise to add a new node to the botnet that is performing the attack.

If you have a WordPress installation with a simple admin password (numbers, letters, less than 10 characters), consider upgrading the strength of your password right away - more than 12 characters and a mixture of uppercase/lowercase/digits/special characters should help strengthen your website's security. Also consider installing a throttling plugin (or apache mod-security) to enforce a timeout on failed login attempts.

WordPress's ability for administrators to use the website to edit PHP files directly makes it a ripe target for attacks - once an attacker has taken control of an administrative account, they can immediately begin injecting their own PHP code into the website. If you are the administrator of a WordPress system, you should consider finding a way to disable the ability of Admin accounts to write to files on the server.

Related Links



comments powered by Disqus