Increased attacks on xmlrpc.php due to IP blocking?
-
I run a handful of sites using WP. For a while now I’ve been noticing increasing numbers of brute force attacks on xmlrpc.php. About 3 weeks ago I switched on IP blocking (using Shield) on all the sites.
The immediate effect was to reduce the bandwidth consumed by each attack, but since then the number of attacks on all sites has increased quite steeply, so the total bandwidth consumed is significantly higher than before, and the monthly running total increases almost every day.
I’m now wondering whether blocking IPs has actually attracted attackers, for instance because they can’t now see that this is a recent WP version and so immune to that particular type of attack. I’ve noticed that occasionally an attack will continue for many hours, presumably because the hackbot isn’t designed to give up on repeatedly dropped connections. So is it likely that some other design flaw makes sites blocking IPs more attractive?
It’s a shared hosting server running Windows 2012 with IIS.
- The topic ‘Increased attacks on xmlrpc.php due to IP blocking?’ is closed to new replies.