Brute Force Attacks on the Rise with WordPress

Originally shared by William Rock

Brute Force Attacks on the Rise with WordPress
http://www.blogaid.net/brute-force-attacks-via-xml-rpc-rise-sharply

Comments

  1. Nice article I just would change XML witch is a markup language, for XML-Enc, a XML Encryption element which contains the cipher data.

    ReplyDelete
  2. MaAnna Stephenson We've also seen an uptick in brute force login attempts. WP installs that are not limiting login attempts via plugin risk these types of attacks.

    What we did on our servers is deny access to xml-rpc.php and allow from specific IP blocks like jetpack & a few WP backup services. Then, instruct our customers how to add additional domains or ips to that whitelist.

    ReplyDelete
  3. Denver Prophit Jr. I cover how to do those very things in an older post that is linked inside this one.

    I can't do the IP whitelist way for many of my clients, as they travel, though. But do the rest.

    But, still getting super high hits on the login page and looks like a lot of them are coming through CloudFlare. I've got a ticket open with them about that, and about not properly resolving to the original IPs so I can see the offending range.

    Will also be password protecting that page via htaccess, just to cut down on system hits. One of my clients had over a million hits!!

    ReplyDelete

Post a Comment

Popular Posts