Deprecated: Function create_function() is deprecated in /home2/blogwebhostingbu/public_html/wp-content/plugins/facebook-like-box-responsive/facebook-like-box.php on line 29
{"id":2290,"date":"2013-04-13T16:46:44","date_gmt":"2013-04-13T16:46:44","guid":{"rendered":"http:\/\/www.webhostingbuzz.com\/blog\/?p=2290"},"modified":"2013-04-15T07:20:05","modified_gmt":"2013-04-15T07:20:05","slug":"further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress","status":"publish","type":"post","link":"https:\/\/blog.webhostingbuzz.com\/2013\/04\/13\/further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress\/","title":{"rendered":"Further steps to combat the world-wide brute force attempts against WordPress"},"content":{"rendered":"

As you may already be aware, the brute force attack on one of the most popular CMS worldwide – WordPress, is still in progress, and has reached world-wide scale. The consequences of this attack are seen not only by our company but by basically any company that provides hosting for WordPress sites. As a rule, we are able to address or filter similar attacks without much trouble, but the current situation is different in scale and the level of resources invested into it.<\/p>\n

At the moment, we have taken a large number of measures to mitigate the results of this attack, but the situation is worsened by several facts:<\/p>\n

1) first of all,the attack is launched from spoofed IP addresses, and blocking these IPs doesn’t have any long-term effect;
\n2) the attack’s algorithm is extremely sophisticated, and is constantly evolving: all our attempts to reduce the consequences of the attacks which were functional an hour ago, are reduced in effect by each new evolution and change in the attack’s pattern;
\n3) the amount of compromised websites grows with each day (mainly websites with weak or default passwords and login credentials), malicious scripts are uploaded to these sites, and these scripts cause a highened network activity and system resource consumption, which influences the function and speed of all services of a hosting server.<\/p>\n

We are constantly monitoring the current situation, and implementing the necessary countermeasures to pro actively deny the attackers the opportunity to compromise the WordPress installations located on our servers, but we’d like to ask you to peripherally assist us in mitigating this difficult situation.<\/p>\n

What you can do:<\/strong><\/p>\n

No in-depth technical knowledge is necessary for this. Below, you can find a directive which will allow you to increase your WordPress websites’ security, and lower the summary load conditions on the hosting server, caused by the brute-force attack on WordPress installations, through a complete access filtering to your WordPress dashboard login interface for third-parties, and allow access to this interface for your IP address and the IPs of your users, only. This is a useful security measure not only during the current brute-force attack, but also at any given time, since it strongly increases the difficulty of compromising your WordPress site’s admin area. We’d like to point out that the directive listed below will limit access only to the dashboard login interface of a WordPress website, and not the website as a whole, or any other of it’s components.<\/p>\n

All that must be done is to add the following rule to the beginning of the “.htaccess” file, which is located in the directory with your WordPress site:<\/p>\n

<Files wp-login.php><\/strong>
\nOrder Deny,Allow<\/strong>
\nDeny from all<\/strong>
\nAllow from xxx.xxx.xxx.xxx<\/strong>
\n<\/Files><\/strong><\/p>\n

“xxx.xxx.xxx.xxx” – this is your IP address, which you can find by simply visiting this website<\/a>. Please indicate the IP you see there instead of xxx.xxx.xxx.xxx.<\/p>\n

We also strongly urge you to set a difficult-to-guess password<\/a> for any admin users you may have, and update all components of your blog, including the WordPress engine itself, and all installed plugins, in a timely manner.<\/p>\n

You can also find useful information on securing your WordPress website at the official WordPress site<\/a>.<\/p>\n

As always, we are here for you:<\/strong><\/p>\n

If you encounter any difficulties in implementing the measure suggested above, please simply contact our support team via our helpdesk<\/a>, and we would be glad to assist you in making the necessary changes.<\/p>\n","protected":false},"excerpt":{"rendered":"

As you may already be aware, the brute force attack on one of the most popular CMS worldwide – WordPress, is still in progress, and has reached world-wide scale. The consequences of this attack are seen not only by our company but by basically any company that provides hosting for WordPress sites. As a rule, […]<\/p>\n","protected":false},"author":430,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"\nHow to help reduce the impact of the global WordPress attack<\/title>\n<meta name=\"description\" content=\"Tips from WebHostingBuzz on how to reduce the impact on the global WordPress hacking attack\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.webhostingbuzz.com\/blog\/2013\/04\/13\/further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to help reduce the impact of the global WordPress attack\" \/>\n<meta property=\"og:description\" content=\"Tips from WebHostingBuzz on how to reduce the impact on the global WordPress hacking attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.webhostingbuzz.com\/blog\/2013\/04\/13\/further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress\/\" \/>\n<meta property=\"og:site_name\" content=\"WebHostingBuzz US Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-13T16:46:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-04-15T07:20:05+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"3 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/#website\",\"url\":\"https:\/\/www.webhostingbuzz.com\/blog\/\",\"name\":\"WebHostingBuzz US Blog\",\"description\":\"Hosting, hosting, more hosting and a little of everything else\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.webhostingbuzz.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/2013\/04\/13\/further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress\/#webpage\",\"url\":\"https:\/\/www.webhostingbuzz.com\/blog\/2013\/04\/13\/further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress\/\",\"name\":\"How to help reduce the impact of the global WordPress attack\",\"isPartOf\":{\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/#website\"},\"datePublished\":\"2013-04-13T16:46:44+00:00\",\"dateModified\":\"2013-04-15T07:20:05+00:00\",\"author\":{\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/#\/schema\/person\/15c48ccc20dc0014da01ca834245c326\"},\"description\":\"Tips from WebHostingBuzz on how to reduce the impact on the global WordPress hacking attack\",\"breadcrumb\":{\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/2013\/04\/13\/further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.webhostingbuzz.com\/blog\/2013\/04\/13\/further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/2013\/04\/13\/further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/2013\/04\/13\/further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress\/\",\"url\":\"https:\/\/www.webhostingbuzz.com\/blog\/2013\/04\/13\/further-steps-to-combat-the-world-wide-brute-force-attempts-against-wordpress\/\",\"name\":\"Further steps to combat the world-wide brute force attempts against WordPress\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/#\/schema\/person\/15c48ccc20dc0014da01ca834245c326\",\"name\":\"Valentin P\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.webhostingbuzz.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4b4269c5f71d6cab8c5a508a5d00671f?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4b4269c5f71d6cab8c5a508a5d00671f?s=96&r=g\",\"caption\":\"Valentin P\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/posts\/2290"}],"collection":[{"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/users\/430"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/comments?post=2290"}],"version-history":[{"count":0,"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/posts\/2290\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/media?parent=2290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/categories?post=2290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.webhostingbuzz.com\/wp-json\/wp\/v2\/tags?post=2290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}