Disturbing login hack attack using real usernames
-
I have set up a WordPress site with two usernames that are not the typical ones tried by most hackbots (e.g. “admin”). I have a plugin installed that blocks an IP of X-number of successive attempted logins, which so far is working fairly well (no successful hacks that I’m aware of). This plugin notifies me when an attack is attempted (after x-number of attempts), telling me the username that was attempted (which most of the time is “admin”).
I got two notices from this site today, and what alarms me is that the username these bots were using to gain access to the site were the real usernames I’m currently using. !!! I have now blocked the IPs these attacks came from (one from India, the other from Taiwan).
However, I’m *very* concerned about how the bot had figured out the real usernames. The only way I can think of how the real usernames could be known to a bot is if someone got it from my computer. For example, if I have a keystroke logger virus, but if that were the case they would have the passwords as well, right?
Is there any other way that a bot or hacker might know the real usernames? And also, how they would know the usernames but not the passwords.
A quick Google search didn’t find anything about this scenario, so I’m hoping someone here might have some ideas about how this happened.
Interestingly, another recent hack attack had used the domain name of the site as the attempted username. Are hack bots getting smarter these days??
Thanks very much in advance for any help.
- The topic ‘Disturbing login hack attack using real usernames’ is closed to new replies.