Security News > 2011 > April > Hackers gain root access to WordPress servers
http://www.computerworld.com/s/article/9215809/Hackers_gain_root_access_to_WordPress_servers By Jeremy Kirk IDG News Service April 14, 2011 Hackers have compromised several servers that support WordPress and may have obtained source code, according to the founding developer of Automattic, the company behind the popular blogging platform. Matt Mullenweg wrote on the WordPress blog that Automattic has been reviewing log records to determine how much information was exposed and re-evaluating "avenues to gain access." "We presume our source code was exposed and copied," Mullenweg wrote. "While much of our code is open source, there are sensitive bits of our and our partners' code. Beyond that, however, it appears information disclosed was limited." Mullenweg wrote that the company had no specific advice for WordPress users besides using strong passwords, not using the same password for multiple sites. [...] ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/
News URL
http://www.computerworld.com/s/article/9215809/Hackers_gain_root_access_to_WordPress_servers
Related news
- LiteSpeed Cache WordPress plugin bug lets hackers get admin access (source)
- Cisco bug lets hackers run commands as root on UWRB access points (source)
- Hackers exploit ProjectSend flaw to backdoor exposed servers (source)
- Russian hackers hijack Pakistani hackers' servers for their own attacks (source)
- Russian hackers hijack Pakistani hackers' servers for their own attacks (source)
- Russia-Linked Turla Exploits Pakistani Hackers' Servers to Target Afghan and Indian Entities (source)
- 390,000 WordPress accounts stolen from hackers in supply chain attack (source)
- APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP (source)