Wordpress Brute Force Attacks

Posted by WSSSupport on July 10, 2013 :: 1:13 pm in Uncategorized

The brute force attempts to gain access into random Wordpress installations across our servers have continued, and we have been forced to continue blocking access to wp-login.php files for affected customers. We apologize for any inconvenience, though you can have them unlocked either by modifying the permissions of the file to 644 (through use of the file manager in your control panel or any FTP client) or by contacting technical support.

Wordpress has put up a codex entry about brute force intrusions, along with their suggestions to help protect yourself, at http://codex.wordpress.org/Brute_Force_Attacks

Further reading, including further suggestions for protecting yourself can be found at http://www.firsttracksmarketing.com/website-development/how-to-protect-your-wordpress-site-from-brute-force-attacks.html

UPDATE: It has been brought to our attention that while the above link will work for general purposes, following the directions to move your wp-login.php file will call the link to log out in your dashboard to stop functioning. To fix this, you will need to edit the “wp-includes/general-template.php” to know where the new file is, as well. In addition, keep in mind that updating Wordpress will revert any changes done, putting your login page back to wp-login.php.

Write a Comment on Wordpress Brute Force Attacks

Comments on Wordpress Brute Force Attacks are now closed.

More

Read more posts by WSSSupport

HVAC Maintenance **UPDATE: CLEARED** Websitesource network connection problems *****Update*****