Latest topics
» NIBIRU News ~ Riveting Sky Images from Mid Sept, 2018 plus MORE
Today at 1:12 am by PurpleSkyz

» This doesn't normally happen here - Something is NOT right | Tropics 'Flexing"
Today at 12:56 am by PurpleSkyz

» Huge bridge-like structure appears in photo of the Moon
Today at 12:50 am by PurpleSkyz

» Linda Moulton Howe Guest Steven Bassett Interview
Yesterday at 9:11 pm by PurpleSkyz

» Mercury In The Libra Constellation September 22-October 10: Get Ready For Big Changes
Yesterday at 8:22 pm by PurpleSkyz

» Happy Autumnal Equinox
Yesterday at 8:19 pm by PurpleSkyz

» Home"less" VICTIMS of Weather an Economic Warfare
Yesterday at 7:17 pm by PurpleSkyz

» Bad-clown Rising ~ CANADIAN KUSH
Yesterday at 7:11 pm by PurpleSkyz

» ORWELLIAN: Apple monitors your phone calls and emails, then calculates a “trust score”
Yesterday at 5:35 pm by PurpleSkyz

» Kerry Cassidy on Mandatory Discernment in the Alternative Media
Yesterday at 5:25 pm by PurpleSkyz

» Pope Francis In Poland Tells World Famous Photographer ‘I Am The Devil’ Then Laughs It Off
Yesterday at 5:11 pm by PurpleSkyz

» President Mushroom Dick :)
Yesterday at 5:01 pm by PurpleSkyz

» Declassified, Unredacted –> Trigger
Yesterday at 3:34 pm by MartyM

» This is How We Clean 88,000 Tons of Plastic From the Ocean
Yesterday at 3:14 pm by MartyM

» Temporal Anchor, Time Lock
Yesterday at 1:44 pm by PurpleSkyz

» #Q Anon: "[LL] recorded calls w/ [RR]" plus more
Yesterday at 1:20 pm by PurpleSkyz

» Mystery "Glitch" BLOCKS Mars Rover Data From Earth..
Yesterday at 11:49 am by PurpleSkyz

» These documents are NOT secret! They ARE a matter of Public Record.
Yesterday at 11:34 am by Consciousness Of Economic

» Bridgette Lyn Dolgoff on the Knew Weigh Radio Show September 20, 2018 PT1, 2 & 3
Yesterday at 11:33 am by Consciousness Of Economic

Yesterday at 10:44 am by Consciousness Of Economic

» The Gray Man Ghost of Pawleys Island Real Footage During Hurricane Florence
Yesterday at 10:29 am by PurpleSkyz

» UFO News ~ "UFO" over Queens - Strange glowing light captivates residents! plus MORE
Yesterday at 10:24 am by PurpleSkyz





Key Word Topics:
11:11, Aliens, Angels, Antarctica, Ascension, Assange, Astral Projection, Auras, Bankers, Bitcoin, Blood Type, Booms, BRICS, Cabal, Cannabis, CBD, CERN, Chemtrails, CME's, Consciousness, Conspiracy Theories, Crypto Currency, Crystals, Dinar, Dinar Scam, Disclosure, Earthquakes, EMF, Empaths, Environment, ESP, ET's, False Flags, Federal Reserve, Flooding, Fluoride, Fracking, Fraud, Fukushima,GMO's, Herbs, History, Holistic, Illuminati, IMF, ISS, Ley Lines, Lucid Dreaming, Mandela Effect, Medical, Meteor, MKUltra, Monsanto, Morgellons, NASA, Nature, Nesara, Nibiru, Night Sky, NDE's, Numerology, NWO, OD's, Organic, Paranormal, Pizzagate, Planet X, Predictive Programming, Protests, Psychic, Q Anon, Radiation, Reincarnation, Remote Viewing, RH Negative Blood, RV, Sacred Geometry, Scams, Science, SETI, Shadow People, Shift, Sink Holes, Smart Meters, Space Force, Space X, Spirit Animals, Sun Simulator, Synchronicity, Technology, TDA, THC, UFO, Vatican, Vaccines, Volcano, WIFI, Wikileaks

You are not connected. Please login or register

Out Of Mind » THE INSANITY OF REALITY » CABAL AGENDA & WORLD DOMINATION » All WP Bloggers’ Warning: Please Read or Lose Your Blog

All WP Bloggers’ Warning: Please Read or Lose Your Blog

Go down  Message [Page 1 of 1]


April 14, 2013

All WP Bloggers’ Warning: Please Read or Lose Your Blog

Change your PW right away to something “unguessable” by the
super-bots or you could be shut down in this massive initiative to
control the Internet.

“These requirements are fairly typical of a secure password: upper
and lowercase letters, at least eight characters long, and including
‘special’ characters (^%$#@*).”

Was Jean Haines’ blog a victim yesterday? She says it’s something she did, but perhaps not. Just be forewarned. She advised she is fine.

Any others, like Blogspot would probably be wise to protect themselves now, too.

WordPress Blog Attacks

from Drake

Security analysts have detected an ongoing attack that uses a huge
number of computers from across the Internet to commandeer servers that
run the WordPress blogging application.

The unknown people behind the highly distributed attack are using
more than 90,000 IP addresses to brute-force crack administrative
credentials of vulnerable WordPress systems, researchers from at least
three Web hosting services reported. At least one company warned that
the attackers may be in the process of building a “botnet” of infected
computers that’s vastly stronger and more destructive than those
available today. That’s because the servers have bandwidth connections
that are typically tens, hundreds, or even thousands of times faster
than botnets made of infected machines in homes and small businesses.

“These larger machines can cause much more damage in DDoS
[distributed denial-of-service] attacks because the servers have large
network connections and are capable of generating significant amounts of
traffic,” Matthew Prince, CEO of content delivery network CloudFlare,
wrote in a blog post describing the attacks.

It’s not the first time researchers have raised the specter of a
super botnet with potentially dire consequences for the Internet. In
October, they revealed that highly debilitating DDoS attacks on six of
the biggest US banks used compromised Web servers to
flood their targets with above-average amounts of Internet traffic. The
botnet came to be known as the itsoknoproblembro or Brobot, names that
came from a relatively new attack tool kit some of the infected machines
ran. If typical botnets used in DDoS attacks were the network
equivalent of tens of thousands of garden hoses trained on a target, the
Brobot machines were akin to hundreds of fire hoses. Despite their
smaller number, they were nonetheless able to inflict more damage
because of their bigger capacity.

There’s already evidence that some of the commandeered WordPress websites are being abused in a similar fashion. A blog post published
Friday by someone from Web host ResellerClub said the company’s systems
running that platform are also under an “ongoing and highly distributed
global attack.”

“To give you a little history, we recently heard from a major law
enforcement agency about a massive attack on US financial institutions
originating from our servers,” the blog post reported. “We did a
detailed analysis of the attack pattern and found out that most of the
attack was originating from [content management systems] (mostly
WordPress). Further analysis revealed that the admin accounts had been
compromised (in one form or the other) and malicious scripts were
uploaded into the directories.”

The blog post continued:

“Today, this attack is happening at a global level and WordPress
instances across hosting providers are being targeted. Since the attack
is highly distributed in nature (most of the IPs used are spoofed), it
is making it difficult for us to block all malicious data.”

According to CloudFlare’s Prince, the distributed attacks are
attempting to brute force the administrative portals of WordPress
servers, employing the username “admin” and 1,000 or so common
passwords. He said the attacks are coming from tens of thousands of
unique IP addresses, an assessment that squares with the finding of more than 90,000 IP addresses hitting WordPress machines hosted by HostGator.

“At this moment, we highly recommend you log into any WordPress
installation you have and change the password to something that meets
the security requirements specified on the WordPress website the
company’s Sean Valant wrote. “These requirements are fairly typical of a
secure password: upper and lowercase letters, at least eight characters
long, and including ‘special’ characters (^%$#@*).”

Operators of WordPress sites can take other measures too, including installing plugins such as this one and this one, which close some of the holes most frequently exploited in these types of attacks. Beyond that, operators can sign up for a free plan from CloudFlare that automatically blocks login attempts that bear the signature of the brute-force attack.

Already, HostGator has indicated that the strain of this mass attack
is causing huge strains on websites, which come to a crawl or go down
altogether. There are also indications that once a WordPress
installation is infected it’s equipped with a backdoor so that attackers
can maintain control even after the compromised administrative
credentials have been changed. In some respects, the WordPress attacks
resemble the mass compromise of machines running the Apache Web server,
which Ars chronicled 10 days ago.

With so much at stake, readers who run WordPress sites are strongly
advised to lock down their servers immediately. The effort may not only
protect the security of the individual site. It could help safeguard the
Internet as a whole.


Thanks to:


Back to top  Message [Page 1 of 1]

Permissions in this forum:
You cannot reply to topics in this forum