What is this? Is it a new hacking script?
-
I’m seeing this a lot in 403/security logs. Persons keep trying from various networks, same various networks for the past month. Denied while searching/attempting to access non-existent files:
[siteurl]/register/%7B%7B=+data.profileurl+/
/{{=
/wp-config.php.@
/wp-config.php.at
/wp-config.php.se
/wp-config.php.br
/wp-config.php2020etc. etc.
They never seem to give up. Yet there’s nothing personal, confidential nor financial hosted. So it’s clear their goal is to take over a site for their own content, which from cyber security experience, is typically for unlawful purposes and content. Majority of these attempts are from networks used for Tor Exits, such as 185(dot)220(dot)101(dot)144.
So does anyone know what these folks are up to?
- The topic ‘What is this? Is it a new hacking script?’ is closed to new replies.