IEyeNews

iLocal News Archives

The Editor Speaks: Website woes

Colin WilsonI expect you have noticed iNews has had only “old” news for the last week or has been showing a notice saying “Data Base Error” and other notices.

 

This has been the result of spammers and attacks that have infected our server.

 

My thanks go out to Malcolm Ellis and his team at Delphi Ltd who went past the call of duty in getting us back to scratch.

 

iNews was not just attacked by multi brute force attacks through our IP address that overloaded the whole site with spam but we had an additional attack from someone else who changed our admin passwords. Even my Manager and myself couldn’t get access!

 

The time it took for a person to actually do this and what they get out of it is a mystery. I happened to be trying to place a story when the person was attacking me and I was “fighting” a battle that I lost, for nearly an hour.

 

Thank you for all the calls and emails I received wondering what was happening.

 

Unfortunately it could happen again…

 

Here is a story from Forbes that illustrates exactly what all of us who use WordPress are facing.

 

We had ALL the latest WordPress updates together with the plugins, we do not use the Admin username and we do not use obvious passwords. We still got hit.

 

We will be posting more new stories throughout the day.

 

WordPress Under Attack: How To Avoid The Coming Botnet

 

By Anthony Wing Kosner, Contributor From Forbes

 

WordPress is easy. That’s why people like it. It’s quick to set up a simple site. It’s easy to manage large amounts of content. It’s easy to add functionality without having to know how to code php because there is such a large developer community that makes tons of free plugins.

 

It’s also pretty easy to hack. When things are easy, we are less vigilant and we do stupid things like using obvious passwords (remember what trouble that caused on LinkedIn?) Less obvious is the use of the default “admin” username and the failure to keep the site software updated.

 

All of these security weaknesses, it turns out, could allow an unidentified group of hackers to use “brute force” attacks on WordPress installations and form a huge “botnet” of infected servers. A report by Dan Goodin in Ars Technica details the threat. Unnamed attackers “are using more than 90,000 IP addresses to brute-force crack administrative credentials of vulnerable WordPress systems, researchers from at least three Web hosting services reported. At least one company warned that the attackers may be in the process of building a “botnet” of infected computers that’s vastly stronger and more destructive than those available today.”

 

A lot of cyber crimes are perpetrated by hackers that use “worms” to infect individual computers and use them to create “spoof addresses” for various types of fraud as well as to execute DDoS [distributed denial-of-service] attacks. Tying together servers with the large amount of network connections possessed by a popular WordPress site would up the ante by an order of magnitude or two.

 

If you or your company have sites that use WordPress, there are two things to consider. First is to avoid having your own site hijacked and second is to avoid becoming part of a larger problem. Think childhood immunizations.

 

Fortunately, there are some simple recommendations that can lower the likelihood of being part of the problem:

 

Avoid Obvious Passwords: A simple check of the security requirements recommended by WordPress will make brute force attacks much more difficult. As Mike Isaac points out in All Things D, “Hackers go after the low-hanging fruit, which is most often found in the novice Web users who don’t take the time to switch from their default login information.” A secure password is a mix of at least eight upper and lowercase letters, numbers and the kinds of ‘special’ characters used to depict curse-words (^%$#@*)!

Ditch The Admin Username: The attackers are in possession of 90,000 IP addresses from which they are trying to crack the default “admin” accounts on WordPress installations. So if you are still using “admin,” create a new user with admin privileges (you will need to use a different email address than the one attached to the current admin) and give it a strong password as defined above. Then log back in as the new user and delete the old admin account and assign all of the posts in that account to the new user. Five minutes, tops.

Use Two Factor Authentication on WP.com: If you have a WP.com account, take advantage of their two-step authentication which assures that you are a human logging in, not a bot.

Update WordPress: Many hackers exploit holes that have been identified in older versions of WordPress, so keeping your install up to date is another easy way to avoid trouble, though this is not as immediately relevant as the above two action items. WordPress founder Matt Mullenweg advises that if you do these first three “you’ll be ahead of 99% of sites out there and probably never have a problem.”

Install A Security Plugin: Using something like the Better WP Security plugin is probably a good idea in general, it won’t do anywhere as much in this case as the suggestions higher up the list. Mullenweg writes, “Most other advice isn’t great—supposedly this botnet has over 90,000 IP addresses, so an IP limiting or login throttling plugin [like Better WP Security] isn’t going to be great (they could try from a different IP a second for 24 hours).”

Consider A Service Like CloudFlare: The Ars Technica article recommends, “operators can sign up for a free plan from CloudFlare that automatically blocks login attempts that bear the signature of the brute-force attack.” Just remember that, as Mike Isaac points out, CloudFlare itself has been “ringing the alarm bells (while simultaneously pimping the company’s own security services.)” See this post from the CloudFlare blog that raised this issue to the awareness of Goodin and Isaac, and make your own judgement.

 

A current estimate figures that one in every six sites on the web runs on WordPress. That’s a lot of fodder to make a botnet out of! Don’t let yours be one of the trampled. Make this five-minute fix today.

 

For more on this story go to:

http://www.forbes.com/sites/anthonykosner/2013/04/13/wordpress-under-attack-how-to-avoid-the-coming-botnet/

 

LEAVE A RESPONSE

Your email address will not be published. Required fields are marked *