Deprecated: Joomla\Input\Input implements the Serializable interface, which is deprecated. Implement __serialize() and __unserialize() instead (or in addition, if support for old PHP versions is necessary) in /homepages/13/d380392445/htdocs/Jlive/libraries/vendor/joomla/input/src/Input.php on line 41

Deprecated: Return type of Joomla\Input\Input::count() should either be compatible with Countable::count(): int, or the #[\ReturnTypeWillChange] attribute should be used to temporarily suppress the notice in /homepages/13/d380392445/htdocs/Jlive/libraries/vendor/joomla/input/src/Input.php on line 170

Deprecated: KunenaControllerApplicationDisplay implements the Serializable interface, which is deprecated. Implement __serialize() and __unserialize() instead (or in addition, if support for old PHP versions is necessary) in /homepages/13/d380392445/htdocs/Jlive/libraries/kunena/controller/application/display.php on line 21

Deprecated: preg_match_all(): Passing null to parameter #2 ($subject) of type string is deprecated in /homepages/13/d380392445/htdocs/Jlive/administrator/components/com_easyblog/includes/adsense/adsense.php on line 138
Detected intrusion attempts again - Macrotone Blogs
By Geoffrey Chapman on Tuesday, 26 March 2013
Category: Miscellaneous

Detected intrusion attempts again

We are seeing a persistent number of web attacks on our site by hackers which seem specificaly designed to attack a WordPress site.

These attacks take the form of Remote File Intrusion attempts. These are where hackers try to force a vulnerable extension into loading PHP code directly from their server. This is done by passing an http(s):// or ftp:// URL in their request, pointing to their malicious site.

They are using Wordpress plugins in the main, so if you are a WordPres site this is something be to aware of. The source of the attacks is a little varied but the IP addresses tend to indicate the US and Canada, but of course these may be compromised addresses hiding the real source.

Leave Comments