RippleSmith Services
  • Home
  • Optimization
  • Marketing
  • About
  • News
  • Contact
  • Home
  • Optimization
  • Marketing
  • RippleSmith Services
  • About
  • News
  • Contact

Ukrainian ISP Behind Over 1.65Mil Daily Brute-Force Attacks on WordPress Sites

Web Optimizers
SEO News
WordPress
0

Over the past three weeks, the number of brute-force attacks against WordPress sites has almost doubled, according to WordPress security firm WordFence.

The company says it recorded a sharp increase in the number of daily attacks and daily IPs involved in brute-force requests following November 24.

Brute-force attacks are attempts to guess a websites admin (or any user’s) credentials by launching repeated authentication requests at small intervals. These attacks usually come at short time intervals, and web firewalls can detect and block them. True brute-force attacks usually involve billions of authentication attempts, as the attacker goes through all the password variations. The incidents WordFence is reporting are most likely dictionary attacks, where an attacker uses a small list of potential passwords, such as “123456” and others. Because most people, including a vast number of security firms and infosec professionals, refer to dictionary attacks as brute-force attacks, this article uses the term brute-force, albeit the correct term would be dictionary attack.

“Usually we see an average of around 13,000 unique IP’s attacking each day. We’re currently seeing over 30,000 unique attacking IPs and this is continuing to increase,” says Mark Maunder, Wordfence Founder and CEO.

Number of attacked sites per day
Number of attacked sites per day [Source: WordFence]
Number of unique IPs involved in brute-force attacks against WordPress sites
Number of unique IPs involved in brute-force attacks against WordPress sites [Source: WordFence]
 

WordFence, who provides a free and paid version of a WordPress security plugin, was able to gather details about the source of these attacks.

One ISP behind a sixth of all brute-force attempts

The company says that most of these brute-force attempts came from one country, and more specifically, from one ISP.

According to statistics, 15.7% of all brute-force attacks on a daily basis come from the Ukraine, with over 2.3 million attacks launched each day.

Number of brute-force attacks per originating country
Number of brute-force attacks per originating country [Source: WordFence]

Of these, over 1.65 million came from an unknown ISP named Pp Sks-lugan, for which there’s almost no information available through Google. In fact, most of the information returned by Google is about abuse reports and security related incidents.

Number of brute-force attacks per originating ISP
Number of brute-force attacks per originating ISP [Source: WordFence]

According to WordFence, over 1.5 million of the daily attacks originating from Pp Sks-lugan are launched from eight IP addresses.

Brute-force attacks from the 8 Ukrainian IPs
Brute-force attacks from the 8 Ukrainian IPs [Source: WordFence]

The brute-force traffic originating from these eight Pp Sks-lugan IP addresses is larger than the entire brute-force traffic coming from GoDaddy, OVH, and Rostelecom put together.

Remind you that these are some of the biggest Internet service providers and hosting companies on the planet, compared to a small Ukrainian hosting firm that nobody has heard of until now.

“The difference between the top two networks and the network in third place is dramatic,” Maunder says. “OVH is a very large hosting provider, but we’re seeing more than 4 times fewer attacks originating from their network than from the #1 Ukrainian host.”

The traffic coming out of this ISP is exclusively for brute-force attacks. “They don’t launch any sophisticated attacks,” Maunder also adds. “They are hammering away at WordPress sites at a rate of over a quarter million login attempts each, in some cases, during a 24 hour period.”

Basic protection measures

The simplest way to prevent brute-force attacks is to install a WordPress firewall plugin. If you don’t run WordPress, there are generic Web Application Firewall services or tools you can use.

If you use WordPress, another trick is to use plugins that hide your admin panel URL, so attackers can’t connect to it. Some of the plugins that allow you to do this are WP Admin Block, HC Custom WP-Admin URL, Protect Your Admin, Custom Login URL, and WPS Hide Login.

WP Admin Block settings page
WP Admin Block settings page

 

Article source: https://www.bleepingcomputer.com/news/security/ukrainian-isp-behind-over-1-65mil-daily-brute-force-attacks-on-wordpress-sites/

0Shares
PrevNext

Related Posts

May 10, 2022

SEM vs. SEO vs. PPC Defined: What’s the Difference?

Web OptimizersSEO News0
November 25, 2017

SEO Guide: How to Optimize Your Posts in WordPress

Web OptimizersSEO News0
May 24, 2017

How Korske Ara of World Photo Day Uses WordPress

Web OptimizersSEO News0

About Us

Based in Vancouver, BC and serving North America, RippleSmith Services is Google Ads certified and is recognized as a trusted business partner of Google. Get in touch to learn more how we can help your business.


Recent Posts

  • SEM vs. SEO vs. PPC Defined: What’s the Difference?
  • Search Engine Land unveils Periodic Tables of PPC
  • SEO Strategy vs. Tactics: What’s the Difference? A Lot!
  • 5 easy but smart SEO wins to boost content and link-building efforts
  • Get In The Race: The PPC Sprint And SEO Marathon

Explore

  • Home
  • Optimization
  • Marketing
  • About
  • News
  • Contact

Topics

Analytics Google PPC SEO WordPress
COPYRIGHT 2024 RIPPLESMITH SERVICES, ALL RIGHTS RESERVED. PRIVACY.
Toll-Free: 1-800-806-5680
137-1290 Howe Street, Vancouver, BC, V6Z 0C2