{"id":2453,"date":"2013-04-12T00:00:00","date_gmt":"2013-04-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/12\/wide-scale-attack-against-wordpress-blogs-reported\/"},"modified":"2021-12-30T11:41:22","modified_gmt":"2021-12-30T11:41:22","slug":"wide-scale-attack-against-wordpress-blogs-reported","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/04\/12\/wide-scale-attack-against-wordpress-blogs-reported\/","title":{"rendered":"Wide-scale attack against WordPress blogs reported"},"content":{"rendered":"<p>Unidentified hackers are said to have have launched a large-scale attack against WordPress blogs and any hosts using weak passwords are urged to update them immediately Security firms have been tracking an escalating number of &#8220;brute force&#8221; attacks against WordPress installations, which have been trying out logins such as &#8220;admin&#8221; and then running through thousands of commonly-used passwords to try to break in. Security firm Incapsula told security blog KrebsOnSecurity that infected sites are seeded with a backdoor that gives the attackers remote control of the site.&nbsp;&nbsp;&nbsp;&#8220;The infected sites then are conscripted into the attacking server botnet, and forced to launch password-guessing attacks against other sites running WordPress,&#8221; the site reported.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;As I type these words, there is an on-going and highly-distributed, global attack on WordPress installations across virtually every web host in existence,&#8221; HostGator said in a post. &#8220;This attack is well organized and again very, very distributed; we have seen over 90,000 IP addresses involved in this attack,&#8221; it said.<\/p>\n<p>Link: <a href=\"http:\/\/www.computerworld.com\/s\/article\/9238377\/Wide_scale_attack_against_WordPress_blogs_reported?source=CTWNLE_nlt_dailyam_2013-04-15\">http:\/\/www.computerworld.com\/s\/article\/9238377\/Wide_scale_attack_against_WordPress_blogs_reported?source=CTWNLE_nlt_dailyam_2013-04-15<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2453","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2453"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2453\/revisions"}],"predecessor-version":[{"id":4940,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2453\/revisions\/4940"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}