WordPress.com servers breached, source code presumed copied
Posted on 14 April 2011.
Automattic - the web development corporation behind WordPress.com - has suffered a root break-in and a compromise of several of their servers.

"We have been diligently reviewing logs and records about the break-in to determine the extent of the information exposed, and re-securing avenues used to gain access," confirmed Matt Mullenweg, a founding developer of WordPress. "We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partnersí code. Beyond that, however, it appears information disclosed was limited."

As the servers also contain proprietary code from their users, Twitter and Facebook usernames and passwords and API keys, users that host their blogs on WordPress.com are advised to change all the passwords that could have been compromised - even though Mullenweg says that the WordPress passwords were stored hashed and salted using phpass - and to use different passwords for different sites.

The investigation is still ongoing, but in his replies to the comments below his post, Mullenweg said that financial information was definitely not compromised and that so far it appears that the hacker's activity was largely exploratory - i.e. not targeted.






Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //