As far as I can tell, the break-in was confined to a single author account. Thanks to David Fitzgerald for alerting Neil and me.
We seem to be back to normal. Let us know if you see anything odd!
widowfield [at] gmail [dot] com
The following two tabs change content below.
Tim is a retired vagabond who lives with his wife and multiple cats in a 20-year-old motor home. To read more about Tim, see our About page.
Latest posts by Tim Widowfield (see all)
- Expanding on My Essay in Varieties of Jesus Mythicism: Part 1 - 2022-12-05 23:07:44 GMT+0000
- K. L. Schmidt’s “Framework” Part 1: Introduction — Duration and Timeline - 2022-07-02 22:22:40 GMT+0000
- K. L. Schmidt’s The Framework of the Story of Jesus: Now in English! - 2022-05-10 23:57:37 GMT+0000
If you enjoyed this post, please consider donating to Vridar. Thanks!
3 thoughts on “Yes, Vridar Was Hacked!”
That said, if anyone DOES need to know about Eastern European mail-order Brides, I did take screen shot pictures…
Perhaps a password guessing attack (there are a LOT of these going on, I get thousands of guesses per day across the sites I administer). You must not have any weak or potentially guessable passwords, this is how all the clients and friends I know who were hacked got in trouble. Install (e.g.) Wordfence and scan for malware in case anything nasty has been installed. Check for new users with admin access. Archive your recent backups.
I was given a site to fix which redirected users to an ad platform only in certain circumstances, like when using an iphone, but then only sometimes, making it very hard to pin down.
Hopefully the user compromised was not an admin, and then you are probably fine. If an admin user, then assume the worst.
I’m seriously looking at two-factor authentication, despite the hassle. WordPress sites are under constant attack by botnets.