SNIPPETS from the Article:-
Simple - all happens with a simple ping-back request to the XML-RPC file
"This is a well-known issue within WordPress and the core team is aware of it, it's not something that will be patched, though. In many cases this same issue is categorized as a feature, one that many plugins use, so in there lies the dilemma."
It’s not uncommon that cyber criminals use PHP web application servers as bots in the attacks. Many WordPress sites, often using the out-of-date TimThumb plugin, were compromised in the past – the same happened to Joomla and other PHP-based applications,” he said.
“Attackers usually target unmaintained servers to which the attackers upload PHP web shells and then use those shells to further deploy attack tools. Attackers connect to the tools either directly or through intermediate servers, proxies or scripts.”
The links below has more information:
http://www.v3.co.uk/v3-uk/news/2333460/hackers-turn-162-000-wordpress-sites-into-ddos-attack-tools
No comments:
Post a Comment