Dalam kuartal 4 atau akhir akhir tahun 2014 hingga sekarang, masih banyak linux server yang terinject script untuk mengakses footprint wp-login ke server lain dengan multi ratus akses yang biasa di sebut bruteforce.
Lebih lanjut untuk masalah security ini : http://blog.sucuri.net/2014/07/new-brute-force-attacks-exploiting-xmlrpc-in-wordpress.html
Abuse ini sampai pihak data center email ke kita untuk menghentikan hal ini karena pihak yang dituju melapokan ke data center kita juga.
Kita telah mengupdate patch mod_sec2 untuk filter serangan yang tertuju ke pihak lain, silahkan tambahkan ini ke file mod_sec2 yang ada di ->
/usr/local/apache/conf/modsec2.user.conf/
tambahkan :
SecUploadDir /tmp
SecTmpDir /tmp
SecDataDir /tmp
SecRequestBodyAccess On
SecAction phase:1,nolog,pass,initcol:ip=%{REMOTE_ADDR},initcol:user=%{REMOTE_ADDR},id:5000124
#<Locationmatch "/wp-login.php">
# Setup brute force detection.
# React if block flag has been set.
# SecRule user:bf_block "@gt 0" "deny,status:401,log,id:5000135,msg:'ip address blocked for 5 minutes, more than 10 login attempts in 3 minutes.'"
# Setup Tracking. On a successful login, a 302 redirect is performed, a 200 indicates login failed.
#SecRule RESPONSE_STATUS "^302" "phase:5,t:none,nolog,pass,setvar:ip.bf_counter=0,id:5000136"
#SecRule RESPONSE_STATUS "^200" "phase:5,chain,t:none,nolog,pass,setvar:ip.bf_counter=+1,deprecatevar:ip.bf_counter=1/180,id:5000137"
#SecRule ip:bf_counter "@gt 10" "t:none,setvar:user.bf_block=1,expirevar:user.bf_block=300,setvar:ip.bf_counter=0"
#</locationmatch>
ErrorDocument 401 default
#Block WP logins with no referring URL
<Locationmatch "/wp-login.php">
SecRule REQUEST_METHOD "POST" "deny,status:401,id:5000130,chain,msg:'wp-login request blocked, no referer'"
SecRule &HTTP_REFERER "@eq 0"
</Locationmatch>
#Wordpress Brute Force detection
SecAction phase:1,nolog,pass,initcol:ip=%{REMOTE_ADDR},id:5000134
<Locationmatch "/wp-login.php">
# Setup brute force detection.
# React if block flag has been set.
SecRule ip:bf_block "@gt 0" "deny,status:401,log,id:5000135,msg:'ip address blocked for 5 minutes, more than 10 login attempts in 3 minutes.'"
# Setup Tracking. On a successful login, a 302 redirect is performed, a 200 indicates login failed.
SecRule RESPONSE_STATUS "^302" "phase:5,t:none,nolog,pass,setvar:ip.bf_counter=0,id:5000136"
SecRule RESPONSE_STATUS "^200" "phase:5,chain,t:none,nolog,pass,setvar:ip.bf_counter=+1,deprecatevar:ip.bf_counter=1/180,id:5000137"
SecRule ip:bf_counter "@gt 10" "t:none,setvar:ip.bf_block=1,expirevar:ip.bf_block=300,setvar:ip.bf_counter=0"
</locationmatch>
Setelah itu restart Httpd atau apache atau webserver yang terhubung ke apache (nginx/lsws {litespeed})


This piece of writing provides clear idea in favor of the new viewers of blogging, that in fact how to do running a blog.
Nice post. I learn something totally new and challenging on blogs I stumbleupon everyday. It’s always interesting to read content from other authors and practice a little something from their web sites.