exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress.com Compromised

WordPress.com Compromised
Posted Apr 14, 2011
Authored by Matt Mullenweg

This is a blog entry from Matt at WordPress.com noting that they suffered from a break-in to multiple servers.

tags | advisory
SHA-256 | d00d0f5623b0d6b2c4c9dc552b2abc86c3bb5ac713f0ea32c14c2d8e60f84b1b

WordPress.com Compromised

Change Mirror Download
---------------------------- Original Message ----------------------------
Subject: [New post] Security Incident
From: "WordPress.com News" <no-reply@wordpress.com>
Date: Wed, April 13, 2011 8:58 pm
To: nix@myproxylists.com
--------------------------------------------------------------------------

Post : Security Incident
URL : http://en.blog.wordpress.com/2011/04/13/security/
Posted : April 13, 2011 at 4:46 pm
Author : Matt
Tags : security

Tough note to communicate today: Automattic had a low-level (root)
break-in to several of our servers, and potentially anything on those
servers could have been revealed.

We have been diligently reviewing logs and records about the break-in to
determine the extent of the information exposed, and re-securing avenues
used to gain access. We presume our source code was exposed and copied.
While much of our code is Open Source, there are sensitive bits of our and
our partners' code. Beyond that, however, it appears information disclosed
was limited.

Based on what we've found, we don't have any specific suggestions for our
users beyond reiterating these security fundamentals:

* Use a strong password, meaning something random
(https://www.grc.com/passwords.htm) with numbers and punctuation.
* Use different passwords for different sites.
* If you have used the same password on different sites, switch it to
something more secure.

(Tools like 1Password (http://agilewebsolutions.com/products/1Password) ,
LastPass (http://lastpass.com/) , and KeePass (http://keepass.info/) make
it easy to keep track of different unique logins.)

Our investigation into this matter is ongoing and will take time to
complete. As I said above, we've taken comprehensive steps to prevent an
incident like this from occurring again. If you have any questions or
concerns, please leave a comment below or contact our support
(http://en.support.wordpress.com/contact/) .

Add a comment to this post:
http://en.blog.wordpress.com/2011/04/13/security/#respond

--
WordPress.com | Thanks for flying with WordPress!

Manage Subscriptions
http://subscribe.wordpress.com/?key=f789a3089316029758e7760f1dd2adad&email=nix%40myproxylists.com

Unsubscribe:
http://subscribe.wordpress.com/?key=f789a3089316029758e7760f1dd2adad&email=nix%40myproxylists.com&b=aCdPTreN%3FJ%2Cm8TRK2pKA%2FOqOK%3FmeJaJqtroqk%3D%2Bccpazu%3D%5BB

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close