Hacker guessed correct superadmin user name… how?
-
I have recently received a WordFence email alert telling me that a login attempt had been blocked – nothing unusual there.
What is disturbing about this one, however, is that the attempt uses the correct superadmin username. Now that is really weird, as I’m using an (effectively) unguessable username… so how did the would-be hacker get hold of it?
I have checked the site and nothing is broken. A WordFence scan looks fine. There have been no actual logins other than my own. So it appears that the username is known, but the password is not.
I have since changed the username (by using these instructions: http://premium.wpmudev.org/blog/change-admin-username/)
Possible vulnerabilities: The username is stored on my iCloud keychain, and also in a PassDrop file which is on my DropBox account. I do occasionally log in from a shared Wifi network at work. None of these seem particularly insecure to me… and yet it must have leaked somewhere!
My question is this: What is the most likely source of the leak, and how can I best prevent it from happening again?
The topic ‘Hacker guessed correct superadmin user name… how?’ is closed to new replies.