Attacks on WordPress sites? [if using WP please read]
Forum rules
Questions about Ren'Py should go in the Ren'Py Questions and Announcements forum.
Questions about Ren'Py should go in the Ren'Py Questions and Announcements forum.
- Reikun
- Miko-Class Veteran
- Posts: 565
- Joined: Tue Dec 20, 2011 9:57 pm
- Completed: Mnemonic Devices, Ciikos Bridge, Helena's Flowers, The Madness
- Projects: Fox in the Hollyhocks
- Organization: skyharborr
- itch: skyharborr
- Contact:
Attacks on WordPress sites? [if using WP please read]
This article from ArsTechnica popped up on my twitter feed: http://arstechnica.com/security/2013/04 ... er-botnet/
I know a lot of VN circles/creators use WordPress for their sites so I figured I'd post this here as I'm not sure people are aware of this. I'm not skilled with WP/CMSs so I can't offer up much advice about what to do from here. Maybe some more versed forum members can shine some light on the best course of action? Is what the Ars article suggests sufficient?
I'm also pretty sure this mostly refers to sites using WP as an installed CMS on their own host and NOT free blogs via wordpress.com (though those could possibly be affected too).
Stay safe, everyone.
I know a lot of VN circles/creators use WordPress for their sites so I figured I'd post this here as I'm not sure people are aware of this. I'm not skilled with WP/CMSs so I can't offer up much advice about what to do from here. Maybe some more versed forum members can shine some light on the best course of action? Is what the Ars article suggests sufficient?
I'm also pretty sure this mostly refers to sites using WP as an installed CMS on their own host and NOT free blogs via wordpress.com (though those could possibly be affected too).
Stay safe, everyone.
-
CheeryMoya
- Miko-Class Veteran
- Posts: 892
- Joined: Sun Jan 01, 2012 4:09 am
Re: Attacks on WordPress sites? [if using WP please read]
Well, shit.
All of the articles I'm finding don't make the clear distinction between WordPress.com or WordPress.org, but this techcrunch article says:
Everyone better change their password pronto, hopefully that'll keep them out. Ugh :/
All of the articles I'm finding don't make the clear distinction between WordPress.com or WordPress.org, but this techcrunch article says:
Which means they're probably assuming you're hosting your own WP-powered site.If your site is hosted on WordPress.com, you can also turn on two-factor authentication to add an extra layer of security.
Everyone better change their password pronto, hopefully that'll keep them out. Ugh :/
- leon
- Miko-Class Veteran
- Posts: 554
- Joined: Sun Oct 09, 2011 11:15 pm
- Completed: Visual Novel Tycoon, Night at the Hospital, Time Labyrinth, The Buried Moon, Left of Center, Super Otome Quest
- Projects: Lemon Project, Porcelain Heart, Dream's Dénouement
- Organization: Team ANARKY
- Contact:
Re: Attacks on WordPress sites? [if using WP please read]
The attack is only woulnarable to sites that are using weak (most commonly used) passwords. So no reason to panic - just change your password to something strong, if it's not already, and you should be safe.According to CloudFlare's Prince, the distributed attacks are attempting to brute force the administrative portals of WordPress servers, employing the username "admin" and 1,000 or so common passwords.
- Maelstrom-Fenrir
- Regular
- Posts: 139
- Joined: Sat Feb 25, 2012 3:09 am
- Completed: Shadow on the Bridge, Time Labyrinth
- Projects: Porcelain Heart, Umbra
- Organization: Black Witch Project
- Skype: Maelstrom-Fenrir
- Location: USA
- Contact:
Re: Attacks on WordPress sites? [if using WP please read]
So would a 25 character password be strong enough?leon wrote:The attack is only woulnarable to sites that are using weak (most commonly used) passwords. So no reason to panic - just change your password to something strong, if it's not already, and you should be safe.According to CloudFlare's Prince, the distributed attacks are attempting to brute force the administrative portals of WordPress servers, employing the username "admin" and 1,000 or so common passwords.

- SundownKid
- Lemma-Class Veteran
- Posts: 2299
- Joined: Mon Feb 06, 2012 9:50 pm
- Completed: Icebound, Selenon Rising Ep. 1-2
- Projects: Selenon Rising Ep. 3-4
- Organization: Fastermind Games
- Deviantart: sundownkid
- Location: NYC
- Contact:
Re: Attacks on WordPress sites? [if using WP please read]
I believe that you can delete the "admin" account and switch to a different username as well, making that one administrator.
- leon
- Miko-Class Veteran
- Posts: 554
- Joined: Sun Oct 09, 2011 11:15 pm
- Completed: Visual Novel Tycoon, Night at the Hospital, Time Labyrinth, The Buried Moon, Left of Center, Super Otome Quest
- Projects: Lemon Project, Porcelain Heart, Dream's Dénouement
- Organization: Team ANARKY
- Contact:
Re: Attacks on WordPress sites? [if using WP please read]
This attack seems to attempt 1000 most commonly used password (probably things like "user", "admin", "password", ...), so only very weak passwords are voulnarable.
Yes, 25 characters would be a bit of an overkill actually. Something like 10-12 characters should be very safe, but you should also make sure to include lovercase, upercase character(s), number(s) and special character(s). For example: 4Rh9m7rd9oDN;
I use an application called LastPass, which generates strong passwords, as well as automatically enters them to website logins. With it I don't have to deal with logins, while keeping all my passwords secure. It made my life a lot easier...
Yes, 25 characters would be a bit of an overkill actually. Something like 10-12 characters should be very safe, but you should also make sure to include lovercase, upercase character(s), number(s) and special character(s). For example: 4Rh9m7rd9oDN;
I use an application called LastPass, which generates strong passwords, as well as automatically enters them to website logins. With it I don't have to deal with logins, while keeping all my passwords secure. It made my life a lot easier...
- arachni42
- Veteran
- Posts: 341
- Joined: Mon Feb 25, 2013 6:33 pm
- Organization: no, I'm pretty messy
- Location: New York
- Contact:
Re: Attacks on WordPress sites? [if using WP please read]
Well, that much is comforting; it would be extra scary if they tried to brute force all the passwords.leon wrote:This attack seems to attempt 1000 most commonly used password (probably things like "user", "admin", "password", ...), so only very weak passwords are voulnarable.
I agree that 25 is overkill for today's computers, although it doesn't really hurt (except in wear and tear on your fingers for typing it)! I have a slightly different opinion on random passwords, though. I used to use them (and still do), but I'm really coming around on pass phrases. Length alone can make a password impractical to brute force, but 4Rh9m7rd9oDN; is a lot harder to remember than renpywhereforeartthourenpy, and the latter is wayyyy longer. And for the lazy people, I also bet there are a lot more common phrases than 1000. This about sums it up:leon wrote:Yes, 25 characters would be a bit of an overkill actually. Something like 10-12 characters should be very safe, but you should also make sure to include lovercase, upercase character(s), number(s) and special character(s). For example: 4Rh9m7rd9oDN;
http://xkcd.com/936/
- Tempus
- Miko-Class Veteran
- Posts: 519
- Joined: Sat Feb 16, 2013 3:37 am
- Completed: Ladykiller in a Bind
- Projects: StoryDevs
- Tumblr: jakebowkett
- Deviantart: jakebowkett
- Github: jakebowkett
- Location: Australia
- Contact:
Re: Attacks on WordPress sites? [if using WP please read]
I use nonsense pass phrases that amuse me. For sites that I don't visit very often (and hence haven't memorised the pass phrase), I just write them on a scrap of paper at my desk. An example would be something like:
- Juan day, I'll eat 50phor burritos!
(One day, I'll eat fifty-four burritos!)
- Greeny
- Miko-Class Veteran
- Posts: 921
- Joined: Sun Dec 20, 2009 10:15 am
- Completed: The Loop, The Madness
- Projects: In Orbit, TBA
- Organization: Gliese Productions
- Location: Cantankerous Castle
- Contact:
Re: Attacks on WordPress sites? [if using WP please read]
Oh my god, they're going to assassinate the internet!
In Orbit [WIP] | Gliese is now doing weekly erratic VN reviews! The latest: Halloween Otome!
Gliese Productions | Facebook | Twitter

Gliese Productions | Facebook | Twitter

- leon
- Miko-Class Veteran
- Posts: 554
- Joined: Sun Oct 09, 2011 11:15 pm
- Completed: Visual Novel Tycoon, Night at the Hospital, Time Labyrinth, The Buried Moon, Left of Center, Super Otome Quest
- Projects: Lemon Project, Porcelain Heart, Dream's Dénouement
- Organization: Team ANARKY
- Contact:
Re: Attacks on WordPress sites? [if using WP please read]
Another way to avoid it would be to simply change the username like SundownKid suggest it. But this applies only to this particular attack; hackers use all sort of other attacks too - better be safe than sorry.arachni42 wrote:Well, that much is comforting; it would be extra scary if they tried to brute force all the passwords.leon wrote:This attack seems to attempt 1000 most commonly used password (probably things like "user", "admin", "password", ...), so only very weak passwords are voulnarable.
The 'difficulty to guess' in that comic applies to brute force (trying every character combination), but if using combinations of common words, a variation of a dictionary attack (trying the words in the english dictionary) would probably crack it pretty fast. Using uncommon words like (like renpywhereforeartthourenpy) or nonsense pass phrases as Tempus suggested should strengten the password significantly.arachni42 wrote:Length alone can make a password impractical to brute force, but 4Rh9m7rd9oDN; is a lot harder to remember than renpywhereforeartthourenpy, and the latter is wayyyy longer. And for the lazy people, I also bet there are a lot more common phrases than 1000. This about sums it up:
http://xkcd.com/936/
Another thing to consider is that you should use a different password for every site or service you use. If you use a single password and a hacker gets their hands on it, they'll have instant access to all your sites. I think the ultimate sollution is to use an application like lastpass, which allows you to stay much more secure and pretty much forget about having to ever deal with those pesky passwords.
Who is online
Users browsing this forum: No registered users






