We value your privacy

We use cookies to enhance your browsing experience, serve personalised ads or content, and analyse our traffic. By clicking "Accept All", you consent to our use of cookies.

Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

No cookies to display.

  • Skip to primary navigation
  • Skip to main content

Technology Solved

Just another Junction30 Sites site

  • Blogging
  • Gadgets and gizmos
  • Social media.
  • Tweetable definitions.
  • FAQs

WordPress under attack – how to protect your site from the admin account hack.

14th April 2013 By Jax Blunt 8 Comments

There’s an Ars Technica article flying around right now about a massive attack on wordpress sites around the internet attempting to build a super botnet. The attack is working by targeting a particular user account that the vast majority of sites have, including this one.

According to CloudFlare’s Prince, the distributed attacks are attempting to brute force the administrative portals of WordPress servers, employing the username “admin” and 1,000 or so common passwords.

User access to wordpress relies on knowing three things. A user id, a password, and a login location. This attack is assuming that there will be an administrator account with the user id admin, and is then firing a brute force attack trying to decode the password. Advice to change your password is not necessarily going to help – it might be that your password of choice is one of the 1000 common ones being used as mentioned above. If you go for a long password with a mixture of letters, number and characters you’re going to be much safer. But if you get rid of the account called admin, you’re going to be immune to this particular attack at least.

First thing to do, check if you’ve got an admin account. Go into your dashboard, select users> all users. You should see something a bit like this. (As ever, click to see it larger.)

user panel wordpress

As you can see, I do indeed have an admin account. It will have a strong password – we have a rule that passwords must be at least 8 characters with a mix of numbers, letters and characters. But I’ve decided we’re going to get rid of it anyway.

Step one – create a new administrator level account. If you’ve only got one email address to play with, you’re going to have to take it out of the existing admin account before you can create the new one. Make sure you give the new account a strong password that you can remember.

Step two – log in with the new account. Delete the existing admin account. You might be worrying about what will happen to posts associated with that account – don’t. You’ll get this dialog up with the choice of who to attribute them to. Pass them to your new user.

deleteusersdialog

And there you go. You now have a wordpress installation without the admin account currently under attack across the internet.

Of course, that’s nowhere near the only thing you can do to protect your beloved blog/website, but it’s an excellent starting point. If you want to go into more detail, you might want to explore a security plugin like this one which will, among other things, allow you to rename the admin account without going through the process I’ve detailed here. And the other thing that’s important to do is keep your theme and plugins updated. Like I’m just about to.

If you’ve found this article helpful, please feel free to share it, and subscribe to my blog. Thanks for dropping by.

Filed Under: Blogging, Newsflash Tagged With: admin account hack, security, wordpress

Reader Interactions

Comments

  1. Caroline says

    16th April 2013 at 9:30 am

    This was a massive help for me, I’be just followed your instructions and feel a lot better! Thank you as always 🙂 Caroline.

    Reply
    • jax says

      16th April 2013 at 11:56 am

      Glad to help.

      Reply
  2. Jem says

    16th April 2013 at 11:53 am

    If you’re technologically minded you can also rename the admin account in phpmyadmin 🙂

    Reply
    • jax says

      16th April 2013 at 11:56 am

      You can, but unless you’re technologically minded I’d advise against it 😉

      Reply
  3. K.H. says

    10th May 2013 at 3:31 pm

    Even though its been a little while, I went in and did this just in case. Thanks!

    Reply
  4. Aly says

    15th May 2013 at 1:53 pm

    Thank you! All done now.I’ll share your link after the school run.

    Reply
  5. JohnC says

    29th April 2014 at 2:36 pm

    During setup I make a point of renaming the admin account so I don’t have this sort of trouble later on.

    Reply
    • Jax Blunt says

      29th April 2014 at 3:16 pm

      Good advice for when people are setting up from scratch, but there are an awful lot of vulnerable installations out there already.

      Reply

Leave a Reply to Jem Cancel reply

Your email address will not be published. Required fields are marked *

Copyright © 2025 · Genesis Sample On Genesis Framework · WordPress · Log in

  • Home
  • Visiting the blog doctor
  • Privacy and disclosure policies.