wordpress brute force

The Highest WordPress Brute Force Attacks – December 2017

December 18th was a good day for hackers. WordPress websites was under highest brute force attack.


According to an analysis by researchers from website security firm Wordfence, this was the highest volume attack that  Wordfence team have seen.

“This is the most aggressive campaign we have seen to date, peaking at over 14 million attacks per hour,” said Wordfence CEO and founder Mark Maunder on Monday.

“The attacker is using sophisticated malware to control compromised WordPress servers remotely. The servers are being used to both attack other WordPress sites and to mine for Monero, a cryptocurrency that can be efficiently mined using web server hardware.” explain attacks Wordfence team.

Also, on the begining of December, a huge database of hacked credentials was discovered. Seems it is related to the later December brute force attacks.

While 4iQ scanning the dark web for stolen, leaked or lost data, ” discovered a single file with a database of 1.4 billion clear text credentials — the largest aggregate database found in the dark web to date.


None of the passwords are encrypted, and what’s scary is we’ve tested a subset of these passwords and most of them have been verified to be true.”

Wordfence says that attackers use “a combination of common password lists and heuristics based on the domain name and contents of the site that it attacks.”

Using this new database that provides fresh credentials that, when matched with a WordPress username, hackers can have a higher success rate for attacking WordPress sites that do not have any protection.

So, we all need to protect our WordPress sites.

How to prevent a brute force attack?

Most brute force attacks work by targeting a website, typically the login page, with millions of username and password combinations until a valid combination is found.

The best methods for brute force protection we recommend:

  1. Rename WordPress login URL to your website. You can do that with Hide my Wp Plugin
  2. Change your admin username from the default ‘admin’ to something harder to guess. 
  3. Verify if you have a strong password which includes Caps, Symbols and Numbers too. Do not reuse a password on multiple services.
  4. Disable XML-RPC protocol plugin
  5. Additionally, you can disable JSON API with Hide my Wp Plugin.
  6. Monitor login fail attempts with Hide my Wp Plugin Brute Force protection

John Darrel

I am a WordPress Developer and I love creating plugins and themes for WordPress. It is a great CMS for any kind of business but we need to keep it a safe place.

I have over 10 years experience in building plugins and themes for WordPress and other platforms.

Contact me if you have plugins that you want me to check before you insert them in your website. I will be happy to check them for security and speed.

2 thoughts on “The Highest WordPress Brute Force Attacks – December 2017

    • John Darrel says:

      Yes, Jetpack is blocking the attacks, the only problem with Jetpack is the loading time which is way too high for a plugin.

Leave a Reply

Your email address will not be published. Required fields are marked *

Check Your Website Vulnerability: