Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in you inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go

Web-infiltrators break into WordPress through Botnet Designed for Capturing Login Details

Hackers have been found attacking WordPress the prominent blogging forum with the help of a botnet designed for seizing login details related to admin-oriented accounts, published venturebeat.com dated April 12, 2013.

According to researchers from 3 Web-hosting facilities -Melbourne Server Hosting, InMotion Hosting and HostGator, the unrecognized Web intruders perpetrating the extremely widespread assault are utilizing over 90,000 Internet Protocol addresses for breaking into administrative login details through brute-force technique from susceptible WordPress machines.

One Web-hosting firm cautioned that possibly a botnet was being built comprising contaminated PCs, which was greatly sturdier as also more damaging compared to any currently going botnet. That was since the servers had numerous-fold faster Internet connections compared to that for botnets comprising contaminated PCs in small-scale enterprises or households.

CEO Matthew Prince of Content Delivery Network CloudFlare posted that the bigger botnets could cause a lot greater destruction through Distributed Denial-of-Service assaults since there were huge network connections for the servers, which were capable of churning considerable volumes of Web-traffic. Arstechnica.com published this dated April 13, 2013.

Big hosting-servers such as HostGator and CloudFlare detected the assault on April 11, 2013. The assault was extremely severe and to the extent which made even Matt Mullenweg, founder of WordPress to post certain piece about the subject on his blog. Softpedia.com published this dated April 13, 2013.

Mullenweg elaborated that about 3-yrs back, WordPress version 3.0 was issued which let anybody select one tailored username following WordPress' loading that greatly ended them setting the default username as "admin."

Presently, there was one botnet that compromised as many WordPress machines as it could catch attempting at logging in using "admin" (referring to the username) as well as a few commonly used passwords, while the development had hit the headlines.

Mullenweg thus urges consumers who continue to utilize the "admin" username that they should alter it while create one hard-to-crack password. It's further recommended that they apply the two-factor validation system while make sure their WordPress loading is of the latest version. Doing this will keep them advance of nearly each-and-every website lurking as also possibly never put them into difficulty.

Related article: Web Flaws Among the Top Three Common Vulnerabilities

ยป SPAMfighter News - 19-04-2013

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next