Global Wordpress Brute Force Attack happening NOW

  • Friday, 12th April, 2013
  • 08:07am

Brute Force Attack affecting global Wordpress Installations

by Stephen K from BWF Hosting


This message is of high importance - please read it all especially the part at the bottom about passwords


What is a Brute Force Attack?


These links will explain what a Brute Force attack is

http://www.techopedia.com/definition/18091/brute-force-attack

http://searchsecurity.techtarget.com/definition/brute-force-cracking


What issues did we handle last night?


I was not working last night and Giles our Senior Support Admin was handling these issues.  This information is what I have gleaned from an email from him.  

Last night around 9pm we were alerted to the fact VPS8 Node was overloaded.  VPS8 is an OpenVZ Node so each virtual server gets equal share of the CPU.   One VPS Server belonging to a client with 100+ Wordpress installs on it was causing the server load to spiral out of control.  

 

We worked to bring this under control and bring the server up on line for other clients.  We also installed a number of products to help mitigate this attack but we are still working on this.  The client affected has all his websites loading but we had to temporarily block access to all wp-login.php files to prevent the server from becoming overloaded.  This in itself proves this overload was caused by the Wordpress Brute Force Attack.

 

The reason this attack is unique is it involves thousands of different IP ranges so it is not a simple matter of blocking a specific range of IPs.  This looks to us like a very well organised attack and very distributed


Here is the current VPS Server load and it is very normal and you can see the load spikes have stopped:

top - 07:29:56 up  5:28,  2 users,  load average: 2.62, 2.77, 3.00


What issues are we handling right now?

Server 28 shared server has a number of resellers who sell Wordpress so it is particularly affected.  Server is working and serving pages but it is sluggish as there are hundreds of concurrent apache connections all attempting to access the wp-login.php page.  We will likely temporarily disable these files across server 28 shortly. This will ensure website still load but the temporary inconvenience is wordpress back ends will not be available.

Why is this different from any other DDOS attack?


Now a DDOS attack directed against one server is not global headline news - we handle it and we move on.  This is different and this is why this message is today marked as high importance.  

 

What Other Webhosts are affected?

It appears all web hosts worldwide are feeling the effects of this.  A few links are below just from Google/Twitter

http://www.hostdime.com/blog/2013/04/brute-force-attack-affecting-global-wordpress-installations/

http://forums.site5.com/showthread.php?p=191613

http://blog.hostgator.com/2013/04/11/global-wordpress-brute-force-flood/
https://www.facebook.com/permalink.php?story_fbid=494405660626327&id=246634765403419


What can I do to protect myself?


Please know our data centre are fully aware of this issue and they are actively blocking the most offending IPs from their entire network.  Please know though this attack is highly distributed which means the range of IPs are huge so they or us will not be able to block all IPs - this is why your security and choosing a secure password is SO IMPORTANT.

 

Your main line of defense here (if your server is stable and not going down)  is to ensure your Wordpress Password is ridiculously secure.  rfp5464   is  NOT a secure password!  Any dictionary word in any shape or form (even with letters replaced with numbers etc) is even less secure.    It is also recommended your user name is not admin as this is default.

Here is a link to a secure password generator:

http://www.pctools.com/guides/password/


  • If your Wordpress Admin password is not secure or has not been changed in a long time please change it now.  People say they are scared they will forget a password and give this as a reason for not resetting it.  Please know if you ever forget your Wordpress admin password our admins can reset it from the server back end so please do change your password now.

  • If your server gets overloaded as a result of this attack we will work to temporarily block the wp-login.php  file of all wordpress sites by setting 000 permissions.  Please note this would be a very temporary solution as effectively we render your Wordpress Admin useless but it does immediately stop the attack.  We already did this on one site overnight.

  • We are working to secure our servers as much as possible with various tools and scripts and will continue to do so.  Our normal non urgent support today may be a little slower as a result of this and we thank you for your patience.

We will endeavour to post more information as we know it.  At this time all our servers are up and running normally and there are no server issues.  Talk to us and we can offer specific advice about additional steps YOU can take to protect your Wordpress installs.
« Back