WordPress and Annotum for Education, Science,Journal Publishing
4.7K views | +0 today
WordPress and Annotum for Education, Science,Journal Publishing
WordPress and Annotum for Education, Science,Professional Journal Publishing with multiple authors and peer-reviews as also Knol to WP Migration...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Hackers turn 162,000 WordPress sites into DDoS attack tools

Hackers turn 162,000 WordPress sites into DDoS attack tools | WordPress and Annotum for Education, Science,Journal Publishing | Scoop.it
Legitimate sites forced to aid criminals' illicit botnet operations


Hackers have hijacked more than 162,000 legitimate WordPress sites, connecting them to a criminal botnet and forcing them to mount distributed denial-of-service (DDoS) attacks, according to security firm Sucuri.


Sucuri CTO Daniel Cid said the company uncovered the botnet when analysing an attack targeting one of its customers. Cid said Sucuri managed to trace the source of the attack to legitimate WordPress sites.

"The most interesting part is that all the requests were coming from valid and legitimate WordPress sites. Yes, other WordPress sites were sending random requests at a very large scale and bringing the site down," read the blog.


Gust MEES's insight:


Learn more:


http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnets


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

Scooped by Gust MEES
Scoop.it!

WordPress - Brute Force Attacks and Their Consequences

WordPress - Brute Force Attacks and Their Consequences | WordPress and Annotum for Education, Science,Journal Publishing | Scoop.it
There is a lot of interesting discussion going on at the moment across the interwebs on the intention of the latest string of Brute Force attacks, much of which

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security


Gust MEES's insight:

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security


A MUST read to understand the WHY and HOW!!!


Gust MEES's curator insight, April 13, 2013 9:56 AM

 

That finding comes from Arbor Networks, which said that attackers had compromised numerous PHP Web applications, such as Joomla, as well as many WordPress sites, many of which were using an outdated version of the TimThumb plug-in. After compromising the sites, attackers then loaded toolkits onto the sites that turned them into DDoS attack launch pads. – Information Week Security

 

A MUST read to understand the WHY and HOW!!!

 
Scooped by Gust MEES
Scoop.it!

How to Protect Your WordPress From Attack

How to Protect Your WordPress From Attack | WordPress and Annotum for Education, Science,Journal Publishing | Scoop.it
An ongoing brute-force attack on WordPress-based websites has compromised more than 90,000 blogs, but there are simple ways to make sure your blog won't be next to fall.
Gust MEES's insight:

 

Check also:

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing?tag=Botnet

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Brute Force Attacks Build WordPress Botnet — Krebs on Security

Brute Force Attacks Build WordPress Botnet — Krebs on Security | WordPress and Annotum for Education, Science,Journal Publishing | Scoop.it

According to Sucuri, WordPress administrators who have been hacked should strongly consider taking the following steps to eradicate the intruders and infections:

 

- Log in to the administrative panel and remove any unfamiliar admin users (the first step after the attackers get in is to add a new user).

 

- Change all passwords for all admin users (and make sure all legitimate accounts are protected with strong passwords this time!)

 

- Update the secret keys inside WordPress, otherwise any rogue admin user can remain logged in.

 

===> Reinstall WordPress from scratch or revert to a known, safe backup. <===

 

Gust MEES's insight:

 

According to Sucuri, WordPress administrators who have been hacked should strongly consider taking the following steps to eradicate the intruders and infections:

 

- Log in to the administrative panel and remove any unfamiliar admin users (the first step after the attackers get in is to add a new user).

 

- Change all passwords for all admin users (and make sure all legitimate accounts are protected with strong passwords this time!)

 

- Update the secret keys inside WordPress, otherwise any rogue admin user can remain logged in.

 

- Reinstall WordPress from scratch or revert to a known, safe backup.

 

Check also:

 

http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing?tag=WordPress

 

Gust MEES's curator insight, April 13, 2013 9:20 AM

 

According to Sucuri, WordPress administrators who have been hacked should strongly consider taking the following steps to eradicate the intruders and infections:

 

- Log in to the administrative panel and remove any unfamiliar admin users (the first step after the attackers get in is to add a new user).

 

- Change all passwords for all admin users (and make sure all legitimate accounts are protected with strong passwords this time!)

 

- Update the secret keys inside WordPress, otherwise any rogue admin user can remain logged in.

 

- Reinstall WordPress from scratch or revert to a known, safe backup.


Check also:


http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing?tag=WordPress