Wordpress Security

The Highest WordPress Brute Force Attacks – December 2017

December 18th was a good day for hackers. WordPress websites was under highest brute force attack.

According to an analysis by researchers from website security firm Wordfence, this was the highest volume attack that  Wordfence team have seen.

“This is the most aggressive campaign we have seen to date, peaking at over 14 million attacks per hour,” said Wordfence CEO and founder Mark Maunder on Monday.

“The attacker is using sophisticated malware to control compromised WordPress servers remotely. The servers are being used to both attack other WordPress sites and to mine for Monero, a cryptocurrency that can be efficiently mined using web server hardware.” explain attacks Wordfence team.

Also, on the begining of December, a huge database of hacked credentials was discovered. Seems it is related to the later December brute force attacks.

While 4iQ scanning the dark web for stolen, leaked or lost data, ” discovered a single file with a database of 1.4 billion clear text credentials — the largest aggregate database found in the dark web to date.

None of the passwords are encrypted, and what’s scary is we’ve tested a subset of these passwords and most of them have been verified to be true.”

Wordfence says that attackers use “a combination of common password lists and heuristics based on the domain name and contents of the site that it attacks.”

Using this new database that provides fresh credentials that, when matched with a WordPress username, hackers can have a higher success rate for attacking WordPress sites that do not have any protection.

So, we all need to protect our WordPress sites.

How to prevent a brute force attack?

Most brute force attacks work by targeting a website, typically the login page, with millions of username and password combinations until a valid combination is found.

The best methods for brute force protection we recommend:

  1. Rename WordPress login URL to your website. You can do that with Hide my Wp Ghost Plugin.
  2. Change your admin username from the default ‘admin’ to something harder to guess.
  3. Verify if you have a strong password which includes Caps, Symbols and Numbers too. Do not reuse a password on multiple services.
  4. Disable XML-RPC protocol plugin
  5. Additionally, you can disable JSON API with Hide my Wp Ghost Plugin.
  6. Monitor login fail attempts with Hide my Wp Ghost Plugin Brute Force protection

John Darrel

I am a WordPress Developer and I love creating plugins and themes for WordPress. It is a great CMS for any kind of business but we need to keep it a safe place. I have over 15 years of experience in building plugins and themes for WordPress and other platforms. Contact me if you have plugins that you want me to check before you insert them into your website. I will be happy to check them for security and speed.

Published by
John Darrel

Recent Posts

WordPress REST API Security: Best Practices and Tools

The WordPress REST API provides a powerful way to interact with your WordPress site using…

1 year ago

WordPress Firewalls & Tools for Your Website Security

One of the most effective strategies for securing a WordPress site is the implementation of…

1 year ago

The Importance of WordPress Security Checks

WordPress security is a critical concern for website owners and administrators. Regular WordPress security checks…

1 year ago

How to Secure a WordPress Database: Essential Tips for Site Owners

Ensuring the security of your WordPress database is crucial to protecting your website from potential…

1 year ago

Protect Your WordPress Website From Hackers with Hide My WP Ghost – Save Money and Avoid Costly Repairs

As a website owner, there are few things more stressful than finding out that your…

2 years ago

4 Essential WordPress Plugins for Small Businesses from Squirrly

Powering around 42% of ALL websites on the internet, WordPress is the most popularCMS in…

4 years ago