BETA
This is a BETA experience. You may opt-out by clicking here

More From Forbes

Edit Story

Wordpress Under Attack: How To Avoid The Coming Botnet

This article is more than 10 years old.

WordPress is easy. That's why people like it. It's quick to set up a simple site. It's easy to manage large amounts of content. It's easy to add functionality without having to know how to code php because there is such a large developer community that makes tons of free plugins.

It's also pretty easy to hack. When things are easy, we are less vigilant and we do stupid things like using obvious passwords (remember what trouble that caused on LinkedIn?) Less obvious is the use of the default "admin" username and the failure to keep the site software updated.

All of these security weaknesses, it turns out, could allow an unidentified group of hackers to use "brute force" attacks on WordPress installations and form a huge "botnet" of infected servers. A report by Dan Goodin in Ars Technica details the threat. Unnamed attackers "are using more than 90,000 IP addresses to brute-force crack administrative credentials of vulnerable WordPress systems, researchers from at least three Web hosting services reported. At least one company warned that the attackers may be in the process of building a "botnet" of infected computers that's vastly stronger and more destructive than those available today."

A lot of cyber crimes are perpetrated by hackers that use "worms" to infect individual computers and use them to create "spoof addresses" for various types of fraud as well as to execute DDoS [distributed denial-of-service] attacks. Tying together servers with the large amount of network connections possessed by a popular WordPress site would up the ante by an order of magnitude or two.

If you or your company have sites that use WordPress, there are two things to consider. First is to avoid having your own site hijacked and second is to avoid becoming part of a larger problem. Think childhood immunizations.

Fortunately, there are some simple recommendations that can lower the liklihood of being part of the problem:

  1. Avoid Obvious Passwords: A simple check of the security requirements recommended by WordPress will make brute force attacks much more difficult. As Mike Isaac points out in All Things D, "Hackers go after the low-hanging fruit, which is most often found in the novice Web users who don’t take the time to switch from their default login information." A secure password is a mix of at least eight upper and lowercase letters, numbers and the kinds of 'special' characters used to depict curse-words (^%$#@*)!
  2. Ditch The Admin Username: The attackers are in possession of 90,000 IP addresses from which they are trying to crack the default "admin" accounts on WordPress installations. So if you are still using "admin," create a new user with admin privileges (you will need to use a different email address than the one attached to the current admin) and give it a strong password as defined above. Then log back in as the new user and delete the old admin account and assign all of the posts in that account to the new user. Five minutes, tops.
  3. Use Two Factor Authentication on WP.com: If you have a WP.com account, take advantage of their two-step authentication which assures that you are a human logging in, not a bot.
  4. Update WordPress: Many hackers exploit holes that have ben identified in older versions of WordPress, so keeping your install up to date is another easy way to avoid trouble, though this is not as immediately relevant as the above two action items. WordPress founder Matt Mullenweg advises that if you do these first three "you’ll be ahead of 99% of sites out there and probably never have a problem."
  5. Install A Security Plugin: Using something like the Better WP Security plugin is probably agood idea in general, it won't do anywhere as much in this case as the suggestions higher up the list. Mullenweg writes, "Most other advice isn’t great—supposedly this botnet has over 90,000 IP addresses, so an IP limiting or login throttling plugin [like Better WP Security] isn’t going to be great (they could try from a different IP a second for 24 hours)."
  6. Consider A Service Like CloudFlare: The Ars Technica article recommends, "operators can sign up for a free plan from CloudFlare that automatically blocks login attempts that bear the signature of the brute-force attack." Just remember that, as Mike Isaac points out, CloudFalre itself has been "ringing the alarm bells (while simultaneously pimping the company’s own security services.)" See this post from the CloudFlare blog that raised this issue to the awareness of Goodin and Isaac, and make your own judgement.

A current estimate figures that one in every six sites on the web runs on WordPress. That's a lot of fodder to make a botnet out of! Don't let yours be one of the trampled. Make this five-minute fix today.

– – – – – – – – – – – – – – – – – – – –

To keep up with Quantum of Content, please subscribe to my updates on Facebook, follow me on Twitter and App.net or add me on Google+.