Brute Force Protection / Rate limit failed
-
We had an attack in a client’s website which is using Wordfence. The attacker was querying the xmplrpc.php multiple times. We’ve registered around 80k requests over a 10 hours period. So this could possibly be a DOS attack or a brute force attack.
In Wordfence we have Brute Force Protection enabled with the default settings (lock out after 5 attempts and so on).
Regarding the possible DOS attack. All the calls came from the same 2 IP addresses based in Russia. In Wordfence the rate limit option is enabled and set to throttle if anyone exceeds 30 requests per minute.
The attacker long exceeded the limits set in Wordfence. Still, they were spawning hundreds of Apache processes, draining resources from the server and taking the website down for hours. The only solution that worked was to block the access to xmplrpc.php completely (via .htaccess). But this has the downside of disabling WordPress’ XML RPC service.
Did anyone experienced that ? Does anyone from Wordfence team as some insight about it ?
- The topic ‘Brute Force Protection / Rate limit failed’ is closed to new replies.