- Joined
- Dec 26, 2007
- Messages
- 7,357
- Reaction score
- 223
While they went though the standard list of passwords the passwords this one actually had the CORRECT admin login (just not password).
When I make a site with WP the first thing I do is that I make another user (not too easy to figure out, either) and give them an admin role. Then, I log in as the new user and make the "admin" account "no role for this user". I also change the new user's display name to "admin". The site doesn't have many posts so I was able to check all the posts and all of them show "admin" as the login.
My system is clean, no viruses, etc. so the only way I can think of is if they got access to the actual database (complicated password)or somehow got an undetectable keylogger on my system (and if so, how come they don't have the password?).
This attack is also coming from the same IP address with other similar attacks on other sites - attempts ranging in the thousands of attempts.
Looks like I need to start changing admin logins as often as I change passwords now. Does anyone have an idea on how the script kiddie could have gotten the login itself (and how I can prevent this from happening again?)?
When I make a site with WP the first thing I do is that I make another user (not too easy to figure out, either) and give them an admin role. Then, I log in as the new user and make the "admin" account "no role for this user". I also change the new user's display name to "admin". The site doesn't have many posts so I was able to check all the posts and all of them show "admin" as the login.
My system is clean, no viruses, etc. so the only way I can think of is if they got access to the actual database (complicated password)or somehow got an undetectable keylogger on my system (and if so, how come they don't have the password?).
This attack is also coming from the same IP address with other similar attacks on other sites - attempts ranging in the thousands of attempts.
Looks like I need to start changing admin logins as often as I change passwords now. Does anyone have an idea on how the script kiddie could have gotten the login itself (and how I can prevent this from happening again?)?