Brute Force Attacks on the Rise with WordPress
Originally shared by William Rock
Brute Force Attacks on the Rise with WordPress
http://www.blogaid.net/brute-force-attacks-via-xml-rpc-rise-sharply
Brute Force Attacks on the Rise with WordPress
http://www.blogaid.net/brute-force-attacks-via-xml-rpc-rise-sharply
Nice article I just would change XML witch is a markup language, for XML-Enc, a XML Encryption element which contains the cipher data.
ReplyDeleteMaAnna Stephenson We've also seen an uptick in brute force login attempts. WP installs that are not limiting login attempts via plugin risk these types of attacks.
ReplyDeleteWhat we did on our servers is deny access to xml-rpc.php and allow from specific IP blocks like jetpack & a few WP backup services. Then, instruct our customers how to add additional domains or ips to that whitelist.
Denver Prophit Jr. I cover how to do those very things in an older post that is linked inside this one.
ReplyDeleteI can't do the IP whitelist way for many of my clients, as they travel, though. But do the rest.
But, still getting super high hits on the login page and looks like a lot of them are coming through CloudFlare. I've got a ticket open with them about that, and about not properly resolving to the original IPs so I can see the offending range.
Will also be password protecting that page via htaccess, just to cut down on system hits. One of my clients had over a million hits!!