Skip to main content

Attackers are using AWS instances to launch attacks on WordPress sites

An image of security icons for a network encircling a digital blue earth.
(Image credit: Shutterstock)

Cybersecurity researchers have noticed an increase in attacks against WordPress websites, with more than a quarter originating from EC2 cloud computing instances of Amazon Web Services (AWS).

Wordpress security experts Wordfence share that of 77,000 IP addresses that have sent out malicious login attempts on WordPress installations, about 5,000 have come from EC2 instances.

Interestingly, Wordfence's QA engineer and threat analyst Ram Gall notes most of the IP addresses used by the attackers only started exhibiting malicious behaviour last week, post which they’ve been added to their blocklist.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

“While AWS makes it easy for businesses to move to the cloud, attackers are also utilizing the scale provided by cloud services, including AWS, in increasing numbers,” shares Gall.

Mercenary IPs

Gall shareed a list of 40 IP addresses that have each made over one million malicious login attempts since November 17, 2021. Surprisingly, these IPs have been on Wordfence’s blocklist for almost a year now.

Gall believes the persistence of these IPs is perhaps indicative of the fact that attackers have paid for them. Banking on this assumption he asserts that it’s high time that websites ensure they have the right mitigations in place “since it has never been easier to inexpensively attack millions of sites at once.”

He points to breaches such as the recent GoDaddy attack, which give attackers hordes of compromised passwords that they then employ to attempt to login to even more sites and services. Thanks to the habit of reusing passwords, credentials gleaned from breaches enables attackers to break into more websites, sometimes on the very first attempt.

In addition to adopting sensible password practices, Gall also recommends users to switch to two-factor authentication (2FA), which he says is an “incredibly effective” method of protecting websites even if the attacker has access to your login credentials.

Protect your computers with the help of the best endpoint protection tools and use these best security keys to add another layer to safeguard your accounts

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.