Security News > 2011 > April > Hackers gain root access to WordPress servers
http://www.computerworld.com/s/article/9215809/Hackers_gain_root_access_to_WordPress_servers By Jeremy Kirk IDG News Service April 14, 2011 Hackers have compromised several servers that support WordPress and may have obtained source code, according to the founding developer of Automattic, the company behind the popular blogging platform. Matt Mullenweg wrote on the WordPress blog that Automattic has been reviewing log records to determine how much information was exposed and re-evaluating "avenues to gain access." "We presume our source code was exposed and copied," Mullenweg wrote. "While much of our code is open source, there are sensitive bits of our and our partners' code. Beyond that, however, it appears information disclosed was limited." Mullenweg wrote that the company had no specific advice for WordPress users besides using strong passwords, not using the same password for multiple sites. [...] ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/
News URL
http://www.computerworld.com/s/article/9215809/Hackers_gain_root_access_to_WordPress_servers
Related news
- US, UK warn of Russian APT29 hackers targeting Zimbra, TeamCity servers (source)
- CISA: Hackers abuse F5 BIG-IP cookies to map internal servers (source)
- Critical Kubernetes Image Builder flaw gives SSH root access to VMs (source)
- Critical default credential in Kubernetes Image Builder allows SSH root access (source)
- Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk (source)
- LiteSpeed Cache WordPress plugin bug lets hackers get admin access (source)
- Cisco bug lets hackers run commands as root on UWRB access points (source)