By Chempo
Hi,
Ok, so on June, 21 my website was getting bruteforce attack on my website. No biggie. It is just a bot that tries usual username/password combinations, it was happening before. But this time my whole droplet went down and all of my sites were down. CPU got to 130% and my write speed on disk droplet went to 9 MB/s.
My question is how to know what was written. I don’t think anyone got into droplet. Maybe it was log files. If anyone knows if there is any scan for malware or something that would be helpful.
Thank you.
This textbox defaults to using Markdown to format your answer.
You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!
just my 2cents (not knowing how much work you already put into it) …in case of doubt always destroy the whole thing next time do a proper ip-tables config and setup fail2ban to include monitoring website login attempts. The “how to” to all of this is available via tutorials on DO.
p.s.: if you’ve already built a whole empire on that droplet I’d send an email to DO support - they are incredibly helpful
It’s also probably not a bad idea to add a host based detection system (HIDS) like Tripwire or OSSEC. These collect details about your filesystem and configuration. It then stores this information to reference and validate the current state of the system. If changes are found between the known-good state and the current state, it could be a sign that your security has been compromised. This software can keep track of many different filesystem data points in order to detect whether unauthorized changes have occurred. Good luck.
also, more simply, just change the login page for wordpress from wp-login.php to something else.
I do this now on every wordpress install I do, and it reduces those brute-force attacks to zero.
you can then delete wp-login.php, but I still add a line to my .htaccess to protect it, since it gets added back during updates:
#prevents access to wp-config
<Files wp-config.php>
order allow,deny
deny from all
</Files>
#prevents access to wp-login
<Files wp-login.php>
order allow,deny
deny from all
</Files>
Get paid to write technical tutorials and select a tech-focused charity to receive a matching donation.
Full documentation for every DigitalOcean product.
The Wave has everything you need to know about building a business, from raising funding to marketing your product.
Stay up to date by signing up for DigitalOcean’s Infrastructure as a Newsletter.
New accounts only. By submitting your email you agree to our Privacy Policy
Scale up as you grow — whether you're running one virtual machine or ten thousand.
Sign up and get $200 in credit for your first 60 days with DigitalOcean.*
*This promotional offer applies to new accounts only.