Wordfence Research and News

Blog icon
Category: Research

Home Router Botnet Shut Down in Past 72 Hours. Who did it?

On April 11th, 3 weeks ago, we published a story discussing routers at a specific set of ISPs that have been hacked.

51 Tools for Security Analysts

Yesterday at Wordfence we had an “all welcome” technology sharing meeting with the entire company – or at least everyone that was available at the time.

Thousands of Hacked Home Routers are Attacking WordPress Sites

Update: By popular request, we have created a tool that lets you check if your own home router is vulnerable to the problems discussed in this post.

1.4 Million Attacks in 24 Hours: 32% Blocked by the New Blacklist

Last Friday we quietly launched a new Premium feature in Wordfence: A real-time IP blacklist that completely blocks known malicious IPs from accessing your website.

In-Depth Analysis of a Criminal Organization Targeting WordPress Websites

Today we are posting an in-depth analysis of a prolific brute force attacker.

Wordfence In Depth: How Malware Becomes Scan Signatures

One of the most effective ways the Wordfence team keeps the WordPress community and customers secure is through something we call the ‘Threat Defense Feed’.

WordPress Used as Command and Control Server in 2016 Election Hack

On Friday evening the Department of Homeland Security released a report [PDF link] containing updated and broader analysis of Russian civilian and military intelligence organization’s attempts to interfere with the 2016 US election.

A Feeding Frenzy to Deface WordPress Sites

In this report we share data on the ongoing flood of WordPress REST-API exploits we are seeing in the wild.

XMLRPC or WP-Login: Which do Brute Force Attackers Prefer

At Wordfence we constantly analyze attack patterns to improve the protection our firewall and malware scan provides.

Analysis: Methods and Monetization of a Botnet Attacking WordPress

At Wordfence we see a huge range of infection types every day as we help our customers repair hacked websites.