{"id":467,"date":"2008-01-08T11:04:34","date_gmt":"2008-01-08T10:04:34","guid":{"rendered":"http:\/\/www.itwriting.com\/blog\/?p=467"},"modified":"2008-01-08T11:04:34","modified_gmt":"2008-01-08T10:04:34","slug":"detailed-look-at-a-wordpress-hack","status":"publish","type":"post","link":"https:\/\/www.itwriting.com\/blog\/467-detailed-look-at-a-wordpress-hack.html","title":{"rendered":"Detailed look at a WordPress hack"},"content":{"rendered":"<p>Angsuman Chakraborty&#8217;s technical blog suffered a similar attack to mine &#8211; the malicious script was the same, though the detail of the attack was different. In my case WordPress was attacked via Phorum. Chakraborty offers a <a href=\"http:\/\/blog.taragana.com\/index.php\/archive\/detailed-post-mortem-of-a-website-hack-through-wordpress-how-to-protect-your-wordpress-blog-from-hacking\/\">detailed look at how his site was compromised<\/a> and makes some suggestions for improving WordPress security.<\/p>\n<p>In both these cases, WordPress was not solely to blame. At least, that is the implication. Chakraborty thinks his attack began with an <a href=\"http:\/\/www.cl.cam.ac.uk\/~sjm217\/advisories\/wordpress-cookie-auth.txt\">exploit described by Secunia<\/a>, which requires the hacker first to obtain access to the WordPress password database, via a stray backup or a SQL injection attack. Nevertheless, Chakraborty says:<\/p>\n<blockquote>\n<p>One of the challenges with WordPress is that security considerations were mostly an afterthought (feel free to disagree) which were latched on as WordPress became more and more popular.<\/p>\n<\/blockquote>\n<p>I have huge respect for WordPress. Nevertheless, I believe its web site could do better with regard to security. The <a href=\"http:\/\/codex.wordpress.org\/Installing_WordPress\">installation instructions<\/a> say little about it. You really need to find <a href=\"http:\/\/codex.wordpress.org\/Hardening_WordPress\">this page<\/a> on hardening WordPress. It should be more prominent.<\/p>\n<div class=\"wlWriterSmartContent\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:956562fd-fd17-421f-b1ce-360d87bcc7f8\" style=\"padding-right: 0px; display: inline; padding-left: 0px; padding-bottom: 0px; margin: 0px; padding-top: 0px\">Technorati tags: <a href=\"http:\/\/technorati.com\/tags\/wordpress\" rel=\"tag\">wordpress<\/a>, <a href=\"http:\/\/technorati.com\/tags\/security\" rel=\"tag\">security<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Angsuman Chakraborty&#8217;s technical blog suffered a similar attack to mine &#8211; the malicious script was the same, though the detail of the attack was different. In my case WordPress was attacked via Phorum. Chakraborty offers a detailed look at how his site was compromised and makes some suggestions for improving WordPress security. In both these &hellip; <a href=\"https:\/\/www.itwriting.com\/blog\/467-detailed-look-at-a-wordpress-hack.html\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Detailed look at a WordPress hack<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44,75,79,96],"tags":[],"class_list":["post-467","post","type-post","status-publish","format-standard","hentry","category-internet","category-security","category-software","category-web-authoring"],"_links":{"self":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/comments?post=467"}],"version-history":[{"count":0,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/467\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/media?parent=467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/categories?post=467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/tags?post=467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}