Daniel Cid
Forum Replies Created
-
Yes, it should be live now.
Forum: Fixing WordPress
In reply to: Recent new xmlrpc.php brute force password-guessing attack detailsOh, it is actually very common to scrape valid user names (and we are seeing it often).
Good example: http://www.acunetix.com/blog/web-security-zone/wordpress-username-enumeration-using-http-fuzzer/
We posted some details on this type of brute force here:
http://blog.sucuri.net/2014/07/new-brute-force-attacks-exploiting-xmlrpc-in-wordpress.htmlBut I agree with James, good web masters with good passwords do not have to worry about it. The issue is that many users have weak passwords and get easily compromised through it.
thanks,
You guessed it right 🙂 It is live now.
Forum: Everything else WordPress
In reply to: I think my website has been hackedThis post has more details:
http://blog.sucuri.net/2014/07/malware-infection-breaking-wordpress-sites.html
thanks!
Yes, I apologize for the scary warnings. We incorrectly flagged a file inside the plugin, but our team corrected it already.
On our next scans, it will return as clean as it should.
We added a default restriction of 5 emails per hour. New updates will have it disabled by default too.
It is fixed on 1.6.2.
Oh shoot, sorry about that. We wanted to turn it on for new installs, but we forgot about the upgrades.
We will get it fixed asap.
thanks,
That looks like a bug. We will investigate and fix it for you.
thanks,
Forum: Plugins
In reply to: [W3 Total Cache] MalwareYou might have some malware that is dependent on W3TC to run. If you can send us your site, we can scan it for you to see if we can identify what is going on.
You can also try to scan it here: http://sitecheck.sucuri.net to see if it is a known injection.
thanks,
Forum: Everything else WordPress
In reply to: Security vulnerabilities in WordPressI have not even read the full report and I can guarantee they are all false positives.
Most code review tools are very verbose and will generate a lot of noise that had to be filtered manually by a developer.
This article is good as well:
http://blog.sucuri.net/2012/03/wordpress-understanding-its-true-vulnerability.html
thanks,
Nope, not at all. We do exactly like that (a file_exists) for the IP address, so it is a quick operation. Plus, we only do it for wp-admin access and not for normal visitors (GET requests).
thanks,
Forum: Fixing WordPress
In reply to: WordPress Site Redirects To Porn On iPad@robnilas: What is the site in case? Can you send it over (even if in private)? I would love to take a look and see why our sitecheck scanner missed it.
thanks,
Forum: Fixing WordPress
In reply to: McAfee labeling site " Malicious Downloads"Try to look for executables or other downloads you might have in there (like .exe, .zip, etc). One of them is likely being flagged by McAfee.
thanks,
Hi Barnez,
You likely need to white list the PHP file that generates the thumbnails. Are you using something like timthumb?
thanks,