Attack on WordPress sites

I am not questioning your knowledge on this subject, I only wrote what blocked the sending of spam from my servers, as the users of the conversation asked about.

The attacks seem to be affecting most Polish servers.

Several dozen companies reported the attacks and asked us to change our passwords. Google, too, told me to change all my passwords on my PC.

Don’t forget to change the domain owner password which in turn may mean you have to change the mysql password and reconfigure wordpress with this new password, but if you leaked your credentials I would be inclined to wipe the server(s) and start again with a fresh OS and of course new passwords

1 Like

to change our passwords

It’s the first thing I told you so I don’t understand it comes back in the conversation :thinking:

But then

The attacks seem to be affecting most Polish servers.

Could you please stop change of version every 10 posts ? :folded_hands:

So now it’s a whole attack against Polish servers ? From a Foreign country I Guess ? If it’s real, you can switch off the server … :frowning:

Or as @jimr1 indirectly said, go through an hosting provider from an other country.

Still extremely important, you didn’t reply to it:

ā€œusing your credentialsā€ (…) does a spammer have your credentials ?

Is it True ? If it is, and the attack you mentioned above is real, I repeat what I said (With a lot of humour, really no harm, but it’s the kind of threat that you can put in the mega heavy category), you can switch off the server :sweat_smile: . Because you shall first find (As already said) How did he get it ? If he have your credential no need to increase any kind of security measures, the attacker can do whatever he want.

Do you have at least a list of attacking IP or does the attack have been done through your own IP (What I’m asking may seems crazy :upside_down_face:, but I take the news as they come :innocent:)

Well, I took it lightly but checked the news and realise that his Country might be under the biggest Cyberattack of all time (Sorry If I missed another).

First @biuro3 by highlighting it you proven (at least near 100%) the problem is not from Virtualmin. So no need to waste too much time on it

Still going slightly off topic (It’s ambiguous) I’m asking here:

  1. In a kind of MITM where the attacker only read the traffic and doesn’t do anything else (He doesn’t try to decrypt anything simply record it):

A lot of people say TLS is a secure way to avoid it BUT if he is already present at the first connection he got the key enabling the encryption. So, I’m asking, in this situation he can record every encrypted data without being detected and then simply decrypt it later, no ? The TLS connection/tunnel is considered secured because most consider it need a good timing, but as long as the hacker is present from the very beginning it no longer change anything, no ? Or do I misunderstand something about it ?

  1. You bought a new server, usually you doesn’t have instantly a certificate and will generate 1 after the whole installation:

a) As long as there are no SSL/TLS connection we agree everything is possible and the MITM can do whatever he want ?

b) How does it work with a newly generated certificate ?

I know I shall create a new topic but it might also concern this one

So there was a credential breach of unknown origin, but a credential breach non the less.

I don’t know that we will ever know the origin but I’d say this is solved and ā€˜closed’ from the forum’s perspective?

2 Likes

You are correct, though the attack has to have quite a high level of access that would be unusual. If someone has infiltrated a network provider between your browser and the server, and if that server does not yet have a trustworthy cert (e.g. from Let’s Encrypt), and is only encrypted with a self-signed cert, it would be possible for the attacker to pretend to be the server you’re trying to reach without you knowing it (if you don’t look very closely at the cert). A very high capability attacker could even make the fake cert look like the one for the system you’re trying to reach in near real-time. That’s a pretty unlikely attack (it requires a lot of capability and a lot of access), and you could still compare the actual cert to the one you see in the browser. But, it’s not impossible, and it’s why browsers complain about self-signed certificates.

However, if a few things were true when Virtualmin was setup (hostname is fully qualified and resolves to the server IP), Virtualmin will setup a sort of hidden Virtual Server _hostname for that hostname and request a cert from Let’s Encrypt. I don’t think the attacker in the above MITM attack could compromise that cert, and if you connect using that and then make certs for all of your other domains (at which point any domain is trustworthy, too), you should be fine.

Then again, if your hosting provider itself is compromised (which is one way an attacker would have the ability to intercede between your server and client at the network layer), there’s nothing you can do. If they have administrative access to the systems that spin up your VM or dedicated server, then they can have root access. They own those servers.

But, all of this continues to be way off-topic. Honestly, I’m happy to discuss/answer questions like this, but please make a new topic!

1 Like

yes i have list ip

1 Like

This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.