WordPress sites targeted in major attack
By Shona Ghosh
Posted on 15 Apr 2013 at 12:55
WordPress sites are being targeted by a major botnet attack that is attempting to crack common usernames and passwords.
Multiple hosting companies have reported an uptick in attacks, with the unknown culprit thought to be using a botnet with 100,000 infected computers to attack vulnerable sites running WordPress as well as Joomla.
One security firm warned that the attackers could be in the process of building a more powerful botnet to prepare for a much larger future attack.
"One of the concerns of an attack like this is that the attacker is using a relatively weak botnet of home PCs in order to build a much larger botnet of beefy servers in preparation for a future attack," wrote CloudFlare CEO Matthew Prince. "These larger machines can cause much more damage in DDoS attacks because the servers have large network connections and are capable of generating significant amounts of traffic."
Even when 'normal service' is resumed, we'll all still be firmly in the sights of the cybercriminals, so take this as a spur to action
Currently the unknown culprits are attempting to brute force access to WordPress and other sites by trying to guess common login credentials, known as a "dictionary attack".
Such automated attacks tend to target "low-hanging fruit" where login credentials are easy to guess, such as "admin" for usernames and "qwerty" for passwords, noted Sophos’ Naked Security blog.
Hosting firm Melbourne warned the attack could cause compromised sites to slow down or crash systems.
Others advised customers running WordPress to change their passwords as soon as possible to safeguard against a possible wider attack.
"The attack volume in this case has been sufficient to attract global attention, which is a good thing, but it's currently thought to be only about three times the usual level," wrote Sophos' head of technology Paul Ducklin. "In other words, even when 'normal service' is resumed, we'll all still be firmly in the sights of the cybercriminals, so take this as a spur to action."
- Google Glass: mugger bait, pub problem and other lessons learned from two dangerous weeks
- Twitter, please don't fiddle with my feed
- How Satya Nadella can get some pay-raise karma
- Windows 10: a step back to go forward
- Michael Dell: Cloud infrastructure is the roads, bridges and highways of the 21st century
- How to check your identity hasn’t been sold to the hackers
- Tim Cook: this is how much TV has changed since the 70s
- Westminster wins the .London battle
- 20 years of PC Pro: from deep pan pizza to virtualisation
- Five reasons why the Apple Watch leaves me cold
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords