Hacker News new | past | comments | ask | show | jobs | submit login
TELL HN: Many sites at Bluehost got hacked today (including their CEO's blog) (sucuri.net)
34 points by marcelo-br on June 28, 2010 | hide | past | favorite | 15 comments



One of our clients on Bluehost was hacked in the last few days too, but not with this. We noticed today, but I'm not sure when it happened. Here's the script.

http://rayschamp.com/misc/spammer.html


A client of ours has eight WP blogs on Bluehost; none of them were affected.


Ouch.

How many times do I need to tell people not to use wordpress? :P


Maybe you should tell them to secure their wordpress install instead:

1. Put an IP lock on the login page via .htaccess so that it can't be accessed from anywhere else but your IP - this one change alone can stop a significant percentage of intruders.

2. Add this line to the .htaccess file at the top level of your WordPress install - <FilesMatch ^wp-config.php$>deny from all</FilesMatch> - it'll make it harder for your database username and password to fall into the wrong hands in the event of a server problem

3. Create an empty wp-content/plugins/index.html file. Otherwise, you leak information on the plugins you're running. One of the easiest ways to break into a wordpress site is to hack through outdated/unsecure plugins. So don't let anyone see what plugins you're running to begin with.

4. In the header.php file for your theme, look for - <meta name=”generator” content=”WordPress <?php bloginfo(’version’); ?>” /> - this line reveals the version of your install. Again, hackers look for wordpress sites that haven't updated to the latest version, so delete this line and don't reveal your site's version.

5. Remove 'Really Simple Discovery' and 'Windows Live Writer' - http://falcon1986.wordpress.com/2009/07/15/remove-unwanted-w...

6. Block injection of malicious code with these 2 steps - http://wpcult.com/wordpress-security-hacks/

7. Whenever wordPress patches a security hole or releases a new version, apply it/upgrade to it immediately

The above steps should stop everyone but the most dedicated intruder. This is a lot more efficient than boycotting wordpress altogether.


Re 3: WordPress now includes this default index.php file in wp-content/plugins/ (and elsewhere) for this purpose:

    <?php
    // Silence is golden.
    ?>
Edit: This is true at least as of 2.9.2. Not sure about earlier versions. (Clarifying that it's not only as of v3.)


First off, thanks for giving out instructions for securing wordpress.

> Maybe you should tell them to secure their wordpress install instead

Hence the ":P", my comment was mostly in jest.

> 3. Create an empty wp-content/plugins/index.html file - otherwise you leak information on which plug-ins you run

It's better to just disable indexes on the entire site. That prevents anyone from poking around.

    Options -Indexes FollowSymLinks
> This is a lot more efficient than boycotting wordpress altogether.

Wordpress has a history of being extremely vulnerable. I don't know how much of it is user error and how much of it is related to the way php is normally configured and used.

PHP invites uploading malicious scripts. Something like Ruby on Rails (or Django) has the code for the application loaded into ram. Static files are served out of the public folder, away from any code. This makes uploading malicious scripts useless, provided someone hasn't turned on php or cgi for the public folder. (Which you should never do) Every php application I've seen or worked on has mixed code with static files and the webserver had write permissions to every folder in the application. Additionally, anyone that doesn't abstract from the database with a query generator or an ORM is asking for sql injection.

That is why I don't care for wordpress. :)

(Am I bitter? Oh yes, most definitely. :P)


I can understand your bitterness, one of my earliest wordpress sites got hacked. I just feel that the benefits of wordpress (ease, flexibility, SEO etc) far outweigh the risk of getting hacked.


Not installing Wordpress in the first place is more efficient, but your checklist illustrates there's no reason to throw the baby out with the bathwater.


I'm interested to know how many of these helpful steps need to be done again when an upgrade is installed? And thanks for sharing these, very useful.


These attacks are not Wordpress-specific. The CEO blog was running Wordpress, but every type of site got affected.


Indeed. If you use shared web hosting (like Bluehost) there are often hundreds of other websites running on the same server. It is trivial to write a script that runs with the permissions of the webserver to snoop other websites' files. Read the config files (wp-config.php in the case of Wordpress) and you can then access the database directly and wreak major havoc.


Note that this is only true if your host is running PHP using mod_php or similar, and they don't have safe_mode configured properly.


A perl script running via cgi could do it, no?


Unless your host is incredibly dumb and doesn't have suexec enabled [1], CGI scripts run as their owner [2].

[1] And, if they don't, you should run away. Fast.

[2] The actual rules are a little more complex than that, but that's what it comes down to.


You mean yesterday?




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: