WordPress blogs vulnerable to DDOS attack

This was the large cyber attack asylum launched on a 1000s of WordPress websites across the web.

In April, 2012 it is reported about a large distributed brute force attack against millions of WordPress sites were occurring, out of that hackers are successful to compromise 90,000 servers to create a large Botnet of WordPress hosts.
According to the DDOS attack logs report  reader ‘Steven Veldkamp‘, victim’s website was under under heavy DDOS attack recently, coming from various compromised WordPress based websites.
The largest word list with the most common username and password combinations are used to brute-force on wordpress Login Panel , attackers are taking control of many poorly secured WordPress Hosts.

After analyzing the piece of a DDOS attack Log file from timing 23/Sep/2013:13:03:13 +0200 to 23/Sep/2013:13:02:47 +0200, we found that in 26 second attacker was able to perform DDOS attack from 569 unique compromised WordPress blogs. Hacked websites include blogs of Mercury Science and Policy at MIT, National Endowment for the Arts (arts.gov), The Pennsylvania State University and Stevens Institute
of Technology.

So an attacker using a large number of high performance hosting in order to build a much larger botnet of for a DDOS attack. This attack is happening at a global level and WordPress instances across hosting providers are being targeted. Since the attack is highly distributed in nature (most of the IP’s used are spoofed), it is very difficult to block all malicious data.

According to the statistics recently published by WP WhiteSecurity, more than 70% of WordPress installations are vulnerable to hackers out of the World’s Top 1 Million websites having a WordPress installed.

From the table above you can determine that at least 30,823 WordPress websites out of 42,106 are vulnerable to exploitable vulnerabilities, which can be detected using free automated vulnerability assessment tools.

Also in August, 2012 Researchers at Arbor Networks have uncovered a botnet called Fort Disco that was used to compromise more than 6000 websites based on popular CMSs such as WordPress, Joomla and Datalife Engine.

If you are running WordPress sites, now would be a good time to ensure that strong passwords are always used and that your username should be changed from “admin”.

Avoid Obvious Passwords, Scan your computer for viruses, keyloggers, rootkits, and botnet software. Most importantly, Update WordPress and all plugins to the latest versions.

Keep Rocking…. 😀
Author : Ashu Singh


Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s