WordPress security firm Wordfence has warned that the number of brute force attacks aimed at WordPress websites has increased significantly in December compared to the previous period.
While malicious actors often exploit vulnerabilities to hack WordPress websites, brute force attacks, where attackers attempt to guess a site’s username and password, can be highly efficient as well.
Wordfence has been monitoring brute force attacks and noticed a significant increase in the past three weeks. In the period between October 16 and November 24, the number of websites attacked each day was under half a million. However, the number of daily attacks soared starting with November 24, on some days exceeding 700,000 attacks.
The security firm said it had blocked as many as 23 million brute force attack attempts per day. Both the number of attacks and the number of targeted websites have nearly doubled compared to the previous weeks. Experts also pointed out that the number of unique attack IPs also increased from an average of roughly 13,000 per day to more than 30,000.
The attacks have been traced to tens of countries, but Ukraine accounts for the largest percentage of attacks (15.7%), followed by France (11.1%), Russia (6.8%), the U.S. (6.6%), India (5.8%), China (4.2%), Germany (3.2%), Italy (2.4%) and the U.K. (2.2%).
The attacks coming from Ukraine originate from 8 IP addresses associated with a local hosting company named Pp Sks-lugan.
“These IPs are using brute force attacks exclusively,” said Mark Maunder, Wordfence founder and CEO. “They don’t launch any sophisticated attacks. They are hammering away at WordPress sites at a rate of over a quarter million login attempts each, in some cases, during a 24 hour period.”
The attacks coming from France have been attributed to 8 IPs belonging to a company called Iliad-Entreprises. The other top organizations whose services have been abused include France-based OVH, US-based GoDaddy and India-based BSNL.
When it comes to WordPress attacks involving the exploitation of vulnerabilities, malicious actors usually target unpatched plugins. A study conducted recently by RIPS Technologies has showed that of 44,000 plugins available in the official WordPress plugins directory, 8,800 are affected by at least one vulnerability.
Related: WordPress Flaw Allows XSS Attack via Image Filenames
Related: Backdoor Uploaded to WordPress Sites via eCommerce Plugin Zero-Day

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
