Jump to content
MDDHosting Forums

WordPress wp-login Brute Force - Kobold Server Update: Boreas and Jasmine


Recommended Posts

Update: The Boreas and Jasmine servers also required some action to keep things stable due to this distributed attack.

 

Update 2: We have made a topic here on our forums giving full directions on how to avoid your site becoming a target of this attack. You can see it here [ http://forums.mddhosting.com/topic/1000-wordpress-brute-force-attacks-and-wp-loginphp-if-youre-running-wordpress-its-important-that-you-view-this-topic/ ].

 

Hello,

 

We found that the Kobold server was running a higher than normal load and had lower than normal Idle CPU available. Upon investigation we found that there were an extremely large number of "wp-login.php" processes running on the server soaking up a fair bit of CPU. We've seen this before - a distributed brute force attack against WordPress installations.

 

We have, to ensure server stability and account speed, blocked access to the wp-login.php for any affected accounts. You can, however, allow yourself in and, if needed, remove the block entirely.

 

We created, if it did not exist, or appended to the /home/your-cpanel-username/.htaccess file the following lines:

# The following lines have been put in place by your hosting provider as your site was under a brute force dictionary attack.
# You can provide yourself access to the wp-admin by adding an "Allow from" line with your IP address before the "Deny from all" line.
# If you need to allow multiple users in you can remove the following lines entirely if you need or you can add multiple "Allow from" lines.
#
# If you have any questions about this at all, do please get with your hosting provider for support.
#
<Files "wp-login.php">
Order Allow,Deny
# Uncomment the following line and change the number to your IP address.  You can find your IP address at http://www.whatismyip.php/
# Allow from 123.456.789.012
Deny from all
</Files>
#
#
# End of brute-force block.  If you do wish to remove the block entirely do not remove beyond this line.
You can remove the "#" from the beginning of the 10th line and change the number "123.456.789.012" to your IP address [ http://www.mddhosting.com/whatismyip.php / http://www.whatismyip.php/ ]. This will permit you the ability to log into your WP-Admin while keeping attackers out.

 

You can make these changes via FTP in the "/" folder you will see a file called ".htaccess" or you can do it via the cPanel -> File Manager [also in "/"] but you may need to set it to show hidden files.

 

Do please understand that if your wp-login.php has been blocked with this code it is because your site was under attack by bots trying to guess your passwords. We hate to make modifications to client accounts, however, in this case we have been forced to do so to ensure server stability.

 

If you have any questions at all about this do not hesitate to ask. If the question is specific to your account it is likely best if you open a new support ticket and reference this thread.

 

Thank you!

Link to comment
Share on other sites

Admin Edit:

While Better WP Security is a great plugin if configured properly - this particular issue revolves around "wp-login.php" which is not addressed solely by "Better WP Security". We have posted a full write-up on stopping this attack/hiding your wp-login and wp-admin in this thread [ http://forums.mddhosting.com/topic/1000-wordpress-brute-force-attacks-and-wp-loginphp-if-youre-running-wordpress-its-important-that-you-view-this-topic/ ].

================

 

Hi There,

 

Plus all WP users really should install this plugin for security: https://wordpress.org/plugins/better-wp-security/

 

And make sure that they use this setting in order to prevent brute-force attacks.:

 

http://mudbox.co.uk/Screen-Shot-2014-02-19-at-14.15.43.png

 

Plus this plugin adds blacklisted domains email etc to .htaccess ;)

 

 

Best

Edited by MikeDVB
Link to comment
Share on other sites

Due to the prevalence of these types of attacks and how distributed they are - it's really not possible to block them using traditional means. If a site has, for example, 500 log-in attempts to try and brute-force the username and password - it's done via 500 distinct IPs.

 

I'm brainstorming a method to not only automate these IP blocks to keep the server and accounts stable but also a means to notify the users when it happens so that they can take action. I really hate to even have to think about something like this from the simple standpoint that it's infuriating that the internet is such a hostile place these days.

 

If we do code something up to put these blocks in place it would only put a block in place after X amount of log-in attempts over Y amount of time. In short - normal usage should not ever cause/trigger a block.

 

Edit: A couple of customers were concerned that somehow sombody had gotten a list of accounts/WordPress installations on our network. It's extremely easy to get a generic list of WordPress installations by searching Google for things like "wp-login.php" in the URL. I ran the search myself and came up with 581,000+ results. The nature of this attack is distributed both in the IPs attacking [trying to log in] as well as the accounts being hit - a few on every server but certainly nowhere near all of them.

 

I just wanted to put your concerns at rest - this is not due to any sort of security breach on our end - it's simply a distributed log-in attack to guess passwords. We see these sorts of attacks all day every day, just usually not on this scale.

Link to comment
Share on other sites

Thanks for the quick solution.

 

The last weeks i have seen several (less than 50) in my two WP websites, to login in admin pages.

 

But using this:

 

http://devel.kostdoktorn.se/limit-login-attempts

 

available also at Wordpress.org plugin site. That locks everything out.

 

I would like to point out that ALL IPs blocked were from Russia (the plugin keeps a database of blocked ips).

Link to comment
Share on other sites

  • 2 weeks later...

We are blocking IPs by those that have POSTED data to wp-login.php but have *not* requested any CSS files [users accessing the wordpress log-in will have requested and received a CSS file] bots do not request anything - they simply post data to the wp-login.php and look for a success/fail result.

 

It is possible there will be some false positives so if you are unable to reach your account/server simply open a ticket with your IP [ http://www.mddhosting.com/whatismyip.php ] and we'll remove the block.

  • Upvote 1
Link to comment
Share on other sites

Unfortunately we've been once again forced to take action.

 

http://www.screen-shot.net/2014-03-08_08-55-15.png

 

It's clear when the brute-force started back up and when we were able to start blocking the issue. If you do end up seing a 403 for your wp-admin/wp-login this means that you were in the top 10 accounts being hit the most and we would suggest following the steps outlined in this thread on our forums: http://forums.mddhosting.com/topic/1000-wordpress-brute-force-attacks-and-wp-loginphp-if-youre-running-wordpress-its-important-that-you-view-this-topic/

Link to comment
Share on other sites

  • 3 weeks later...

We had to put some more blocks in place on the Kobold server:

http://www.screen-shot.net/2014-03-29_15-15-15.png

 

If you see a 'Forbidden' error accessing your wp-admin that means your account was under attack - we do suggest reading the very first post in this thread as well as seeing this thread to prevent this in the future:

http://forums.mddhosting.com/topic/1000-wordpress-brute-force-attacks-and-wp-loginphp-if-youre-running-wordpress-its-important-that-you-view-this-topic/

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...