In the past we have reported about many such cyber attacks, where attackers hacked into the WordPress blogs using password brute-force attack or they used the PINGBACK vulnerability in older versions of WordPress without compromising the server.
WordPress has a built in functionality called Pingback, which allows anyone to initiate a request from WordPress to an arbitrary site and it can be used for a single machine to originate millions of requests from multiple locations.
We have seen more than 100,000 IP addresses involved in the recent DDOS attack and the victim’s Forum website received more than 40,000 requests in 7 minutes from different WordPress blogs and IP addresses.
- DDOS AttacksOriginally Originated From .edu’s and .gov’s (hacktplanet.wordpress.com)
- Paly internet to Stand Still in DDoS Attack, Nobody Notices. (dailypillage.wordpress.com)
- Bluesun 2600: Bitcoin Thefts Surge, DDoS Hackers Take Millions – Slashdot (yro.slashdot.org)
- DDOS Attack Motivation: Hacktivism, Extortion, Competitors and Experiments (news.softpedia.com)
- DDoS threats: The disruption your organization can’t afford to ignore (gigaom.com)
- Indonesian hackers bring Australian Security site nationalsecurity.gov.au down with DDoS attack under #OpAustralia Campaign (techworm.in)
- Obamacare website threatened by hackers using DDoS attacks (digitaltrends.com)
- Secure WordPress From Hackers With Free Plugins (terryjett.com)
- An Introduction to DDOS Attacks and Protection (mikex666.wordpress.com)