Wordpress sites used to perform DDoS attacks

162,000 legitimate Wordpress sites performed the attacks using pingbacks and trackbacks.

More than 160,000 Wordpress blogs have been used to perform Distributed Denial of Service (DDoS) attacks against other websites.

The Wordpress sites were used to perform the attacks if they had pingbacks or trackbacks enabled, which is activated by default when a new blog is set up.

The problem was revealed when one site went down because it was getting too many access requests. Quickly, it was closed down by its host for overloading the server.

The website owner then contacted Securi Research to halt the attacks.

Sucuri CTO and OSSEC founder Daniel Cid said in a blog post: "Once the DNS was ported we were able to see what was going on, it was a large HTTP-based (layer 7) distributed flood attack, sending hundreds of requests per second to their server.

"All queries had a random value (like "?4137049=643182?) that bypassed their cache and force a full page reload every single time," Cid said.

The company discovered all the requests were coming from legitimate and non-harmful Wordpress sites sending random requests via a ping back request to the XML-RPC file, which quickly overloaded the server.

Cid also explained in the post that Wordpress site owners can stop their site being involved in future attacks by inserting the code below into their Wordpress site:

add_filter( xmlrpc_methods', function( $methods ) { unset( $methods['pingback.ping'] ); return $methods; } );

Anyone who suspects their site may have been used in an attack can check its url against the logs on Securi's website.

Last month, web hosting firm CloudFlare was subject to a DDoS attack that was so large it slowed down European and US networks for more than 24 hours.

CloudFlare CEO Matthew Prince said via Twitter it was larger than the one suffered by anti-spam group Spamhaus last year and warned, Someone's got a big, new cannon. Start of ugly things to come.'

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Recommended

What are biometrics?
Security

What are biometrics?

27 Nov 2020
Black Friday's best antivirus deals
Security

Black Friday's best antivirus deals

27 Nov 2020
Veritas Access Appliance with IBM Spectrum® Protect
Server & storage

Veritas Access Appliance with IBM Spectrum® Protect

27 Nov 2020
Ransomware protection with Veritas NetBackup Appliances
Security

Ransomware protection with Veritas NetBackup Appliances

27 Nov 2020

Most Popular

80% of cyber professionals say the Computer Misuse Act is working against them
Security

80% of cyber professionals say the Computer Misuse Act is working against them

20 Nov 2020
Cisco acquires container security startup Banzai Cloud
Security

Cisco acquires container security startup Banzai Cloud

18 Nov 2020
What is phishing?
phishing

What is phishing?

25 Nov 2020