GMA News Online

Botnets attack, brute force batter Wordpress and Joomla 

April 13, 2013 3:40pm
Bloggers and website owners using WordPress and Joomla may want to take tighter security precautions for their accounts, after hosting providers noted brute force attacks targeting these platforms have tripled.
A report on The Next Web said such attacks, where the attackers use botnets to batter the accounts, are slowing down or even rendering the targets unavailable.
“While these attacks against popular content management systems are nothing new, the sudden increase is a bit worrying. Until the botnet in question is taken down, however, there is not much that can be done aside from ensuring you are taking every precaution. That includes using a solid username and password combination as well as ensuring your CMS and plugins are up-to-date,” it said.
The Next Web cited a report by Melbourne Server Hosting that it has detected signs over the past 48 hours of increased attempts.
It added Immotion Hosting has noted the attempts came from “a large amount of IP addresses spread across the world.”
Such signs may suggest the attackers are using a botnet to break in, The Next Web said.
Also, it said HostGator has noted at least 90,000 computers are involved while CloudFlare has noted it “more than tens of thousands of unique IP addresses” are being used.
On the other hand, it said security firm Sucuri has recorded 30,000 to 40,000 attacks a day for the last few months, but in April, the number went up to 77,000 per day on average, and more than 100,000 per day in recent days.
The Next Web added the top five usernames being attempted are admin, test, administrator, Admin, and root.
It said the top five passwords being attempted are admin, 123456, 666666, 111111, and 12345678.
“Obviously, if you are using any common user name or password, you should change it immediately,” it said. – KDM, GMA News
Go to comments

We welcome healthy discussions and friendly debate! Please click Flag to alert us of a comment that may be abusive or threatening. Read our full comment policy here.
Comments Powered by Disqus