Attacks on WordPress sites? [if using WP please read]

Forum organization and occasional community-building.
Forum rules
Questions about Ren'Py should go in the Ren'Py Questions and Announcements forum.
Post Reply
Message
Author
User avatar
Reikun
Miko-Class Veteran
Posts: 565
Joined: Tue Dec 20, 2011 9:57 pm
Completed: Mnemonic Devices, Ciikos Bridge, Helena's Flowers, The Madness
Projects: Fox in the Hollyhocks
Organization: skyharborr
itch: skyharborr
Contact:

Attacks on WordPress sites? [if using WP please read]

#1 Post by Reikun » Sat Apr 13, 2013 10:00 pm

This article from ArsTechnica popped up on my twitter feed: http://arstechnica.com/security/2013/04 ... er-botnet/

I know a lot of VN circles/creators use WordPress for their sites so I figured I'd post this here as I'm not sure people are aware of this. I'm not skilled with WP/CMSs so I can't offer up much advice about what to do from here. Maybe some more versed forum members can shine some light on the best course of action? Is what the Ars article suggests sufficient?

I'm also pretty sure this mostly refers to sites using WP as an installed CMS on their own host and NOT free blogs via wordpress.com (though those could possibly be affected too).

Stay safe, everyone.
ImageImageImage

fastest way to contact me: DM @skyharborr on twitter

CheeryMoya
Miko-Class Veteran
Posts: 892
Joined: Sun Jan 01, 2012 4:09 am

Re: Attacks on WordPress sites? [if using WP please read]

#2 Post by CheeryMoya » Sat Apr 13, 2013 10:28 pm

Well, shit.

All of the articles I'm finding don't make the clear distinction between WordPress.com or WordPress.org, but this techcrunch article says:
If your site is hosted on WordPress.com, you can also turn on two-factor authentication to add an extra layer of security.
Which means they're probably assuming you're hosting your own WP-powered site.

Everyone better change their password pronto, hopefully that'll keep them out. Ugh :/

User avatar
leon
Miko-Class Veteran
Posts: 554
Joined: Sun Oct 09, 2011 11:15 pm
Completed: Visual Novel Tycoon, Night at the Hospital, Time Labyrinth, The Buried Moon, Left of Center, Super Otome Quest
Projects: Lemon Project, Porcelain Heart, Dream's Dénouement
Organization: Team ANARKY
Contact:

Re: Attacks on WordPress sites? [if using WP please read]

#3 Post by leon » Sat Apr 13, 2013 10:29 pm

According to CloudFlare's Prince, the distributed attacks are attempting to brute force the administrative portals of WordPress servers, employing the username "admin" and 1,000 or so common passwords.
The attack is only woulnarable to sites that are using weak (most commonly used) passwords. So no reason to panic - just change your password to something strong, if it's not already, and you should be safe.

User avatar
Maelstrom-Fenrir
Regular
Posts: 139
Joined: Sat Feb 25, 2012 3:09 am
Completed: Shadow on the Bridge, Time Labyrinth
Projects: Porcelain Heart, Umbra
Organization: Black Witch Project
Skype: Maelstrom-Fenrir
Location: USA
Contact:

Re: Attacks on WordPress sites? [if using WP please read]

#4 Post by Maelstrom-Fenrir » Sat Apr 13, 2013 10:37 pm

leon wrote:
According to CloudFlare's Prince, the distributed attacks are attempting to brute force the administrative portals of WordPress servers, employing the username "admin" and 1,000 or so common passwords.
The attack is only woulnarable to sites that are using weak (most commonly used) passwords. So no reason to panic - just change your password to something strong, if it's not already, and you should be safe.
So would a 25 character password be strong enough?

User avatar
SundownKid
Lemma-Class Veteran
Posts: 2299
Joined: Mon Feb 06, 2012 9:50 pm
Completed: Icebound, Selenon Rising Ep. 1-2
Projects: Selenon Rising Ep. 3-4
Organization: Fastermind Games
Deviantart: sundownkid
Location: NYC
Contact:

Re: Attacks on WordPress sites? [if using WP please read]

#5 Post by SundownKid » Sat Apr 13, 2013 10:50 pm

I believe that you can delete the "admin" account and switch to a different username as well, making that one administrator.

User avatar
leon
Miko-Class Veteran
Posts: 554
Joined: Sun Oct 09, 2011 11:15 pm
Completed: Visual Novel Tycoon, Night at the Hospital, Time Labyrinth, The Buried Moon, Left of Center, Super Otome Quest
Projects: Lemon Project, Porcelain Heart, Dream's Dénouement
Organization: Team ANARKY
Contact:

Re: Attacks on WordPress sites? [if using WP please read]

#6 Post by leon » Sat Apr 13, 2013 10:58 pm

This attack seems to attempt 1000 most commonly used password (probably things like "user", "admin", "password", ...), so only very weak passwords are voulnarable.
Yes, 25 characters would be a bit of an overkill actually. Something like 10-12 characters should be very safe, but you should also make sure to include lovercase, upercase character(s), number(s) and special character(s). For example: 4Rh9m7rd9oDN;
I use an application called LastPass, which generates strong passwords, as well as automatically enters them to website logins. With it I don't have to deal with logins, while keeping all my passwords secure. It made my life a lot easier...

User avatar
arachni42
Veteran
Posts: 341
Joined: Mon Feb 25, 2013 6:33 pm
Organization: no, I'm pretty messy
Location: New York
Contact:

Re: Attacks on WordPress sites? [if using WP please read]

#7 Post by arachni42 » Sat Apr 13, 2013 11:54 pm

leon wrote:This attack seems to attempt 1000 most commonly used password (probably things like "user", "admin", "password", ...), so only very weak passwords are voulnarable.
Well, that much is comforting; it would be extra scary if they tried to brute force all the passwords.
leon wrote:Yes, 25 characters would be a bit of an overkill actually. Something like 10-12 characters should be very safe, but you should also make sure to include lovercase, upercase character(s), number(s) and special character(s). For example: 4Rh9m7rd9oDN;
I agree that 25 is overkill for today's computers, although it doesn't really hurt (except in wear and tear on your fingers for typing it)! I have a slightly different opinion on random passwords, though. I used to use them (and still do), but I'm really coming around on pass phrases. Length alone can make a password impractical to brute force, but 4Rh9m7rd9oDN; is a lot harder to remember than renpywhereforeartthourenpy, and the latter is wayyyy longer. And for the lazy people, I also bet there are a lot more common phrases than 1000. This about sums it up:
http://xkcd.com/936/
I, Miku (NaNoRenO 2014)
Vignettes (NaNoRenO 2013)
_________________

User avatar
Tempus
Miko-Class Veteran
Posts: 519
Joined: Sat Feb 16, 2013 3:37 am
Completed: Ladykiller in a Bind
Projects: StoryDevs
Tumblr: jakebowkett
Deviantart: jakebowkett
Github: jakebowkett
Location: Australia
Contact:

Re: Attacks on WordPress sites? [if using WP please read]

#8 Post by Tempus » Sun Apr 14, 2013 6:02 am

I use nonsense pass phrases that amuse me. For sites that I don't visit very often (and hence haven't memorised the pass phrase), I just write them on a scrap of paper at my desk. An example would be something like:
  • Juan day, I'll eat 50phor burritos!
    (One day, I'll eat fifty-four burritos!)
I dunno about anyone else, but that kind of thing is easy for me to remember. Plus, it's mixed case and contains numerals, spaces and grammar.
StoryDevs — easy-to-search profiles for VN devs (under construction!)

User avatar
Greeny
Miko-Class Veteran
Posts: 921
Joined: Sun Dec 20, 2009 10:15 am
Completed: The Loop, The Madness
Projects: In Orbit, TBA
Organization: Gliese Productions
Location: Cantankerous Castle
Contact:

Re: Attacks on WordPress sites? [if using WP please read]

#9 Post by Greeny » Sun Apr 14, 2013 11:43 am

Oh my god, they're going to assassinate the internet!
In Orbit [WIP] | Gliese is now doing weekly erratic VN reviews! The latest: Halloween Otome!
Gliese Productions | Facebook | Twitter
Image

User avatar
leon
Miko-Class Veteran
Posts: 554
Joined: Sun Oct 09, 2011 11:15 pm
Completed: Visual Novel Tycoon, Night at the Hospital, Time Labyrinth, The Buried Moon, Left of Center, Super Otome Quest
Projects: Lemon Project, Porcelain Heart, Dream's Dénouement
Organization: Team ANARKY
Contact:

Re: Attacks on WordPress sites? [if using WP please read]

#10 Post by leon » Sun Apr 14, 2013 11:30 pm

arachni42 wrote:
leon wrote:This attack seems to attempt 1000 most commonly used password (probably things like "user", "admin", "password", ...), so only very weak passwords are voulnarable.
Well, that much is comforting; it would be extra scary if they tried to brute force all the passwords.
Another way to avoid it would be to simply change the username like SundownKid suggest it. But this applies only to this particular attack; hackers use all sort of other attacks too - better be safe than sorry.
arachni42 wrote:Length alone can make a password impractical to brute force, but 4Rh9m7rd9oDN; is a lot harder to remember than renpywhereforeartthourenpy, and the latter is wayyyy longer. And for the lazy people, I also bet there are a lot more common phrases than 1000. This about sums it up:
http://xkcd.com/936/
The 'difficulty to guess' in that comic applies to brute force (trying every character combination), but if using combinations of common words, a variation of a dictionary attack (trying the words in the english dictionary) would probably crack it pretty fast. Using uncommon words like (like renpywhereforeartthourenpy) or nonsense pass phrases as Tempus suggested should strengten the password significantly.

Another thing to consider is that you should use a different password for every site or service you use. If you use a single password and a hacker gets their hands on it, they'll have instant access to all your sites. I think the ultimate sollution is to use an application like lastpass, which allows you to stay much more secure and pretty much forget about having to ever deal with those pesky passwords.

Post Reply

Who is online

Users browsing this forum: No registered users