Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Another round of WordPress Attacks - SANS Internet Storm Center SANS ISC InfoSec Forums

Participate: Learn more about our honeypot network

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Another round of WordPress Attacks

H-Security has published an article ( discussing a new series of attacks against WordPress-based sites.

Multiple ISPs have been hit including GoDaddy, Bluehost, Dreamhost, Network Solutions and Media Temple. There is one report that even sites built with the most current version of WordPress have been compromised.

We will update as we have more information, at this point I recommend reading the H-Security article for the summary of the scripts being added and contacting your hosting provider if you have concerns about your site.


68 Posts
May 10th 2010
I would like to know if there are any tools to analyze webserver logs for signs of various sorts of mischief -- a sort of after-the-fact IDS function. Something as simple as a sed file of patterns could help. Granted it would not help with compromised shared hosting or stolen FTP credentials. But it would have its place.

Sign Up for Free or Log In to start participating in the conversation!