ANS Documentation

Improve This Doc
  • Cloud
  • Domains and DNS management
  • Backup and High Availability
  • eCommerce Stacks
  • Security
    • DDoSX®
    • Web Application Firewall
    • Threat Monitoring and Threat Response
      • General Information and FAQs
      • How does it work?
      • System Requirements
      • Getting Started
      • Installing on a UKFast hosted server
      • Installing on a non-UKFast hosted server
      • PCI DSS Compliance
      • Alerts and rulesets
      • Attack Ruleset
      • High Level Alerts Explained
      • Alert Remediation Tips
      • Common Attacks
      • Databases
      • Exploits
      • File Monitoring (FIM)
      • Malware
      • Service Specific Alerts
      • System
      • Windows
      • Scans and Reconnaissance
    • McAfee Antivirus
    • Vulnerability Scans
    • ANS MDR
    • Keeping Magento secure
    • Keeping WordPress secure
    • Brute Force Attacks
    • CryptoLocker
    • Dirty COW
    • The Logjam attack
    • Meltdown and Spectre
    • Memcached security concerns and reflection/amplification DDoS attacks
    • Wana Decryptor / Wana Decrypt0r 2.0 / WannaCry
    • Log4J Vulnerability
    • Polkit Security Vulnerability CVE-2021-4034
    • CVE-2022-0847 - Dirty Pipe Vulnerability
  • Email
  • Monitoring and usage management
  • Networking
  • Operating systems
  • Webcelerator
  • MyUKFast
  • Home >
  • Security >
  • Threat Monitoring and Threat Response >
  • Attack Ruleset >
  • WordPress

WordPress¶

WordPress is an incredibly powerful website CMS that powers over 40% of websites on the Internet, so its no surprise that it’s also one of the most common targets for attackers. WordPress, being more user-orientated and it’s the ability to be expanded with plugins is especially susceptible to exploits and Zero-Day attacks.

Monitor WordPress Activity¶

UKFast’s Threat Monitoring has the ability to track WordPress activity and detect common attacks.

  • Plugins activated, deactivated and upgraded

  • Successful account logins

  • Failed User Account Logins

  • User password reset

  • New User added

  • New Blog Post Published

  • Blog Post Deleted

  • New Attachments

Login Brute Force¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

URL Contains: wp-login.php|/administrator

Regex: "POST \S+wp-login.php| "POST /administrator

Frequency: 8

Timeframe: 30

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

Comment Spam from fake Search Engine Bots¶

Signatures detected

Triggered when the URL request contains any of the flowing patterns:

Patterns are separated by a |

Request Type: POST

URL Contains: /wp-comments-post.php

Regex: Googlebot | MSNBot | BingBot

Severity

Threat Monitoring will classify this attack as a high, triggering the source IP address to be blocked using the below methods. As this attack is not severe, an alert will not be sent out via email, however, these attacks will still show up in dashboards in your MyUKFast.

Remediation and Blocking

Should a high-level attack be detected, Threat Monitoring will block the source IP address using a host-based firewall, IPTables (Linux) or Windows firewall for 30 minutes.

Next Article > High Level Alerts Explained

  • Useful Links
  • SMB
  • Enterprise
  • Channel
  • Public Sector
  • ANS Data Centres
  • About ANS
  • Careers
  • Blog
  • Get in touch
  •  
  • Sales 0800 458 4545
  • Support 0800 230 0032
  • Get in touch

© ANS Group Limited | Terms and Conditions | Corporate Guidance | Sitemap
ANS Group Limited, registered in England and Wales, company registration number 03176761, registered office 1 Archway, Birley Fields, Manchester M15 5QJ