Jump to content

Wordpress hack connects users to botnet


sincity

Recommended Posts

Wordpress hack connects users to botnet

More than 100,000 Wordpress websites have conscripted into a botnet which forces them them to inadvertently launch DDoS attacks.

Security firm Sucuri found the botnet when analysing an attack targeting one of its customers and traced the source of the attack to legitimate WordPress sites.

The attackers used a well-known flaw in WordPress code which meant that one attacker could use thousands of popular and clean WordPress sites to perform their DDoS attack, while being hidden.

The workaround is to disable the dodgy XML-RPC functionality of a site or download an automated scanner tool from a legitimate security service provider.

Supply Chain

Network security company Lancope said that the criminals wanted to set up a supply chain for compromised connected computers for their botnets.

CTO, Tim Keanini, said the cybercriminals continue to innovate and find vulnerabilities to exploit for their criminal activity with no end to the supply of targets.

He said that these sorts of hacks were a problem that was going to get worse, particularly as the industry moves towards the "internet of things."

mf.gif
twitter.png facebook.png linkedin.png googleplus.png email.png


rc.img
rc.img
rc.img

a2.imga2t.img2mlJdUHF8Og
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.