253david
Forum Replies Created
-
I got this email this morning from BT
Hello David,
Apologies for not getting back to you for some time now.
We have identified the culprit as a 3rd party customer/user located in Italy. We have been in contact with our Italian BT teams and they have assured us that controls/restrictions have been put into place on this user as a result of these attacks on your website.
Please come back to us if there is a reoccurrence of this again.
Regards,
—————————–
All the attacks on my site have come to an end. At least for now.
I think this makes my point. Don’t be passive about attacks. Report them! It may take a while to get results like it did in this case but next time it shouldn’t take BT nearly as long to track the source down.
This post makes me think that what we are seeing is a wide scale exploitation of routers.
I see it with browser based gmail too.
<p>This email was sent from your website “—–” by the Wordfence plugin at Monday 19th of January 2015 at 06:14:45 AM</p>
<p>The Wordfence administrative URL for this site is: http://—-/wp-admin/admin.php?page=Wordfence</p>
<p>A user with IP address 154.58.193.208 has been locked out from the signing in or using the password recovery form for the following reason: Used an invalid username ‘admin’ to try to sign in.</p>
<p>User IP: 154.58.193.208
</p>While I am on this subject. I try to report most of the login attempts to the source ISP. Sometimes they want time zone and destination IP information. I don’t suppose you could add that to the report so I could just cut and paste or forward the email?
I am finding a great many of the IP addresses of my Bot attacks on one of my sites end up showing Air OS router login screens. I’m wondering if the embedded Linux on the Air OS routers is being exploited?
Yes, I have been able to find login screens. For example at 89-97-143-189.ip17.fastwebnet.it.
It seems that most likely the embedded web servers on the routers/modems have been exploited.
They need to keep hearing from us.
The Aethra BG1242W looks like a residential or small business router with Internet and Voice Over IP phone capability. I’m not finding any with a login screen.
Do you know if Albacom and Fastweb ISPs have begun working on this problem. I am getting 4 or 5 fewer IPs because I have most of them blocked but I am still getting attacked every four hours.
I just did a count of the hits from static.albacom.net and there were over 400 static.albacom.net IP addresses involved since 12/10/2014. I am sure it is about the same for fastwebnet.it. There were a few from other ISPs including Comcast Business but most of the other ones were also Italian ISPs.
This has been the most persistent attack I have seen since installing Wordfence. This is also by far the most bot IP addresses on two ISPs that I have ever seen. I am assuming it keeps rotating targets and gets back to me about every four hours.
And the permanent solution is?
“Goes back to sleep”I have been seeing the same thing for about a week. I immediately block login attempts with the username “admin” and I have the lockout set for 60 days. I am also using advanced blocking to block ranges of IP addresses. They try with 12 to 16 IPs about every four hours. I’m not sure why they continue to waste their time.
Please take the time to report the problem to the ISP. If they hear from enough of use maybe they will do something.
[ redacted ]
fastwebnet.it is FASTWEB-POP-INTERNET their abuse contact is abuse@fastweb.it
They are going to want as much of a log as you can provide. It should include dates, times, type of attack, their IP numbers and the IP and domain name of your wordpress site.
If anyone knows the full range of IP addresses for either one of these ISPs please share it. I’d much rather see this bot network shut down than blocked. I almost always report this type of thing. If it is a bot on a US web hosting provider they almost always find and remove it.
Would it be possible for you to send me your blacklist so I can get some of these hacked sites reported and cleaned up?
I am getting it now I don’t know if your experience will be the same. It comes and goes. https://trona-high-alumni.com
Also here: http://www.trona-ca.com/
They are both getting tronahistory.com but not each other.
Forum: Requests and Feedback
In reply to: Pharmacy Hack Alive and WellI’m declaring this hack dead. It is too easy to find for it to survive much longer and I am starting to find people who can grasp this concept. It is a rich pool of information about hacks that will soon be lost. If you have any interest in this type of hack I suggest you start looking for them and start building a database about them. You will learn which host providers host the most of them, what type of webmaster is most vulnerable, the paths the hackers pick to store files, their SEO dictionary (Which will help locate more sites using a simple search.), and certainly much more than I have time to list or to discover. One question remains, why has this hack been around so long? I smell the blood in the water already.
To find a seed site search for Purchase Medication, Order Medication, Generic purchase, followed by a drug name.
Once have located you first hacked site look for a txt file and it will give you more SEO search terms that will help locate other sites.
Also, find the hidden link sites. siteexplorer.info can help with this. The hidden link sites will give you the URLs of about 20 more hacked sites each. Do the same with each hacked site on the list.
Then think about how you can automate this and how this data can be useful?
You can bet that the hackers have a database about every pharma hacked site and have are using to learn which host providers are good targets and many other things about WordPress users bad habits.
All this is just sitting there in plan site for anyone willing to take the time.
Getting an email when someone gets locked out became an issue for me. Especially one day when my site was being hammered by a brute force dictionary attack from multiple IP addresses. I unchecked that box.
I did however choose to continue emails when people tried to logon to a nonexistent account. The other day even that became annoying. Rather than uncheck that box too I decided to try putting a roadblock in the way of those pesky bots.
I added a Google Authenticator app. The bots don’t know what to make of having third box to fill out. These days 2 factor authentication is a must on administrator accounts anyway.
Never mind the support ticket. I should have come here first.
Forum: Requests and Feedback
In reply to: Pharmacy Hack Alive and Well@jan Dembowski
Those “black hat hackers” work in volume and use hacked sites en masse. You won’t make one bit of difference to those hackers because they don’t care.
You don’t know it but you really made my point with that statement. I’ll leave it to you to figure out how.
Consider adding this to your list of useful links:
http://pharma-hack.com/