Michael D. Posted February 19, 2014 Report Share Posted February 19, 2014 Update: The Boreas and Jasmine servers also required some action to keep things stable due to this distributed attack. Update 2: We have made a topic here on our forums giving full directions on how to avoid your site becoming a target of this attack. You can see it here [ http://forums.mddhosting.com/topic/1000-wordpress-brute-force-attacks-and-wp-loginphp-if-youre-running-wordpress-its-important-that-you-view-this-topic/ ]. Hello, We found that the Kobold server was running a higher than normal load and had lower than normal Idle CPU available. Upon investigation we found that there were an extremely large number of "wp-login.php" processes running on the server soaking up a fair bit of CPU. We've seen this before - a distributed brute force attack against WordPress installations. We have, to ensure server stability and account speed, blocked access to the wp-login.php for any affected accounts. You can, however, allow yourself in and, if needed, remove the block entirely. We created, if it did not exist, or appended to the /home/your-cpanel-username/.htaccess file the following lines:# The following lines have been put in place by your hosting provider as your site was under a brute force dictionary attack. # You can provide yourself access to the wp-admin by adding an "Allow from" line with your IP address before the "Deny from all" line. # If you need to allow multiple users in you can remove the following lines entirely if you need or you can add multiple "Allow from" lines. # # If you have any questions about this at all, do please get with your hosting provider for support. # <Files "wp-login.php"> Order Allow,Deny # Uncomment the following line and change the number to your IP address. You can find your IP address at http://www.whatismyip.php/ # Allow from 123.456.789.012 Deny from all </Files> # # # End of brute-force block. If you do wish to remove the block entirely do not remove beyond this line. You can remove the "#" from the beginning of the 10th line and change the number "123.456.789.012" to your IP address [ http://www.mddhosting.com/whatismyip.php / http://www.whatismyip.php/ ]. This will permit you the ability to log into your WP-Admin while keeping attackers out. You can make these changes via FTP in the "/" folder you will see a file called ".htaccess" or you can do it via the cPanel -> File Manager [also in "/"] but you may need to set it to show hidden files. Do please understand that if your wp-login.php has been blocked with this code it is because your site was under attack by bots trying to guess your passwords. We hate to make modifications to client accounts, however, in this case we have been forced to do so to ensure server stability. If you have any questions at all about this do not hesitate to ask. If the question is specific to your account it is likely best if you open a new support ticket and reference this thread. Thank you! Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 19, 2014 Author Report Share Posted February 19, 2014 For those that may be curious the blocks were put in place at 23:40 on this graph:http://www.screen-shot.net/2014-02-19_00-10-37.png The top graph is Idle CPU and the higher the better. The bottom graph is server load and the lower the values the better. Quote Link to comment Share on other sites More sharing options...
JohnUK Posted February 19, 2014 Report Share Posted February 19, 2014 (edited) Admin Edit:While Better WP Security is a great plugin if configured properly - this particular issue revolves around "wp-login.php" which is not addressed solely by "Better WP Security". We have posted a full write-up on stopping this attack/hiding your wp-login and wp-admin in this thread [ http://forums.mddhosting.com/topic/1000-wordpress-brute-force-attacks-and-wp-loginphp-if-youre-running-wordpress-its-important-that-you-view-this-topic/ ].================ Hi There, Plus all WP users really should install this plugin for security: https://wordpress.org/plugins/better-wp-security/ And make sure that they use this setting in order to prevent brute-force attacks.: http://mudbox.co.uk/Screen-Shot-2014-02-19-at-14.15.43.png Plus this plugin adds blacklisted domains email etc to .htaccess Best Edited March 8, 2014 by MikeDVB Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 19, 2014 Author Report Share Posted February 19, 2014 We also had to do some blocking on the Boreas server as well due to this distributed brute-force dictionary attack. Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 20, 2014 Author Report Share Posted February 20, 2014 Jasmine is also now experiencing this issue and some blocks have had to be put in place. http://www.screen-shot.net/2014-02-19_22-49-42.png Again - the top graph going up is good and the bottom graph going down is also good. Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 20, 2014 Author Report Share Posted February 20, 2014 Due to the prevalence of these types of attacks and how distributed they are - it's really not possible to block them using traditional means. If a site has, for example, 500 log-in attempts to try and brute-force the username and password - it's done via 500 distinct IPs. I'm brainstorming a method to not only automate these IP blocks to keep the server and accounts stable but also a means to notify the users when it happens so that they can take action. I really hate to even have to think about something like this from the simple standpoint that it's infuriating that the internet is such a hostile place these days. If we do code something up to put these blocks in place it would only put a block in place after X amount of log-in attempts over Y amount of time. In short - normal usage should not ever cause/trigger a block. Edit: A couple of customers were concerned that somehow sombody had gotten a list of accounts/WordPress installations on our network. It's extremely easy to get a generic list of WordPress installations by searching Google for things like "wp-login.php" in the URL. I ran the search myself and came up with 581,000+ results. The nature of this attack is distributed both in the IPs attacking [trying to log in] as well as the accounts being hit - a few on every server but certainly nowhere near all of them. I just wanted to put your concerns at rest - this is not due to any sort of security breach on our end - it's simply a distributed log-in attack to guess passwords. We see these sorts of attacks all day every day, just usually not on this scale. Quote Link to comment Share on other sites More sharing options...
cziv Posted February 20, 2014 Report Share Posted February 20, 2014 Thanks for the quick solution. The last weeks i have seen several (less than 50) in my two WP websites, to login in admin pages. But using this: http://devel.kostdoktorn.se/limit-login-attempts available also at Wordpress.org plugin site. That locks everything out. I would like to point out that ALL IPs blocked were from Russia (the plugin keeps a database of blocked ips). Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 28, 2014 Author Report Share Posted February 28, 2014 When it rains, it pours - this is happening on kobold, echo, and boreas now. We're working on mitigating it. Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 28, 2014 Author Report Share Posted February 28, 2014 We've blocked approximately 400 IPs across all three servers. Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 28, 2014 Author Report Share Posted February 28, 2014 Up to 760 IPs blocked and climbing. Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 28, 2014 Author Report Share Posted February 28, 2014 Crossed 1,200 IPs blocked. Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 28, 2014 Author Report Share Posted February 28, 2014 Attack largely mitigated but we're going to continue blocking IPs that are attacking. http://www.screen-shot.net/2014-02-28_14-09-27.png Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 28, 2014 Author Report Share Posted February 28, 2014 We are blocking IPs by those that have POSTED data to wp-login.php but have *not* requested any CSS files [users accessing the wordpress log-in will have requested and received a CSS file] bots do not request anything - they simply post data to the wp-login.php and look for a success/fail result. It is possible there will be some false positives so if you are unable to reach your account/server simply open a ticket with your IP [ http://www.mddhosting.com/whatismyip.php ] and we'll remove the block. 1 Quote Link to comment Share on other sites More sharing options...
Michael D. Posted February 28, 2014 Author Report Share Posted February 28, 2014 All blocks flushed - modified the detection method to help eliminate false positives. 1 Quote Link to comment Share on other sites More sharing options...
Michael D. Posted March 8, 2014 Author Report Share Posted March 8, 2014 Unfortunately we've been once again forced to take action. http://www.screen-shot.net/2014-03-08_08-55-15.png It's clear when the brute-force started back up and when we were able to start blocking the issue. If you do end up seing a 403 for your wp-admin/wp-login this means that you were in the top 10 accounts being hit the most and we would suggest following the steps outlined in this thread on our forums: http://forums.mddhosting.com/topic/1000-wordpress-brute-force-attacks-and-wp-loginphp-if-youre-running-wordpress-its-important-that-you-view-this-topic/ Quote Link to comment Share on other sites More sharing options...
Michael D. Posted March 29, 2014 Author Report Share Posted March 29, 2014 We had to put some more blocks in place on the Kobold server:http://www.screen-shot.net/2014-03-29_15-15-15.png If you see a 'Forbidden' error accessing your wp-admin that means your account was under attack - we do suggest reading the very first post in this thread as well as seeing this thread to prevent this in the future:http://forums.mddhosting.com/topic/1000-wordpress-brute-force-attacks-and-wp-loginphp-if-youre-running-wordpress-its-important-that-you-view-this-topic/ Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.