{"id":548,"date":"2022-02-24T09:39:50","date_gmt":"2022-02-24T09:39:50","guid":{"rendered":"https:\/\/www.qd-design.co.uk\/blog\/?p=548"},"modified":"2022-03-29T12:19:07","modified_gmt":"2022-03-29T11:19:07","slug":"russian-invasion-of-ukraine-and-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.qd-design.co.uk\/blog\/russian-invasion-of-ukraine-and-cyber-attacks\/","title":{"rendered":"Russian Invasion of Ukraine and Cyber-attacks"},"content":{"rendered":"\n<p>Firstly, my thoughts go out to everyone in Ukraine and to anyone that has friends and family there.&nbsp; I hope they are managing to keep safe.<\/p>\n\n\n\n<p>Given that in the 20<sup>th<\/sup> Century we experienced 2 world wars, numerous regional conflicts that were proxies for, and could have escalated into, global conflicts, as well as countless civil wars and border disputes, to see a European country brazenly invade a neighbour based on patently untrue reasons is shocking.&nbsp; I sincerely hope the Russians come to their senses and cease this invasion ASAP.<\/p>\n\n\n\n<p>In the run up to this invasion, several web commentators suggested that there would be an increase in cyber-attacks that occurred in parallel with the invasion on the ground. Based on the activity logs of several websites I have created and or manage; this seems to have commenced already.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">WordPress sites are particularly at risk<\/h2>\n\n\n\n<p>I have identified concerted and extensive efforts to access websites that are noticeably different to the everyday attempts to login using a likely administrator username.&nbsp; &nbsp;You will understand if I don\u2019t give any more details than this.<\/p>\n\n\n\n<p>However, as the most widely used website development platform (by a considerable margin), it is not surprising if WordPress gets more attention.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">I use Wix, Squarespace, Ionos, am I OK then?<\/h2>\n\n\n\n<p>Sadly not.&nbsp; Whilst WordPress accounts for the vast majority of websites developed using a Content Management System (and therefore attracts more attention from cyber-attackers), ANY website that has an \u2018admin\u2019 login of some sort is likely to come under attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Am I under attack from the KGB?<\/h2>\n\n\n\n<p>No.&nbsp; State organised cyber-attacks, should they occur, will focus upon major institutions such as banks, utilities, transport networks, government, and the military.&nbsp; Unless you work in one of these organisations \/ sectors then state organised cyber attacks are unlikely to impact you.<\/p>\n\n\n\n<p>However, Russia has, as <a rel=\"noreferrer noopener\" href=\"https:\/\/www.wired.com\/story\/russias-cyber-threat-to-ukraine-is-vast-and-underestimated\/\" target=\"_blank\">Wired Magazine<\/a> puts it \u201c<em>An expansive web on nonstate actors, from cybercriminals to front organisation to patriotic hackers that it can and has leveraged to its advantage<\/em>\u201d.&nbsp; Moscow has habitually turned a blind eye to their activities so long as their focus has been outside of Russia.&nbsp; Their activities might not be directed specifically at your business or organisation but as the <a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack\" target=\"_blank\">WannaCry<\/a> malware cryptoworm outbreak in 2017 proved, collateral damage can spread far and wide. &nbsp;As a result of WannaCry, the NHS saw tens of thousands of computers infected, equipment such as MRI scanners out of action and postponed non urgent treatment for some patients.&nbsp; It is unlikely that the NHS was a primary target for this malware but once it got into their systems, it spread rapidly and with devastating impact.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why do the attackers want to break into my website?<\/h2>\n\n\n\n<p>The cyber-attackers have numerous possible reasons for trying to access your site.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>To spread misinformation and propaganda<\/li><li>For financial gain \u2013 e.g. Ransomeware where your site and data is held \u2018captive\u2019 until you pay for it to be released <\/li><li>To connect with your users and followers (you may have very few, but they don\u2019t know this)<\/li><li>To attack other websites<\/li><li>Malevolence \u2013 lets create even more disruption and unrest by defacing \/ taking down websites<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">What might a cyber-attacker do?<\/h2>\n\n\n\n<p>The first thing they will probably do if they gain access to your site, is change your password thus freezing you out. &nbsp;Other Administrators (if they exist) will be deleted to give them free rein to do whatever they like.<\/p>\n\n\n\n<p>Your content may either be removed or amended to suit their objectives.<\/p>\n\n\n\n<p>If you take payments for goods and services via your website, then most probably the beneficiary account will be switched so they take any future funds.<\/p>\n\n\n\n<p>If you have a full eCommerce store on your site, you may find that your products are removed and replaced with goods that are under control of the cyber-attacker.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How do cyber-attackers break into websites?<\/h2>\n\n\n\n<p>They use a range of different methods.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Brute force<\/strong> \u2013 they keep trying username and password combinations until they find one that works.&nbsp; These may have been harvested from previous data breaches and be sitting in huge databases available to purchase from the dark web.&nbsp;<\/li><li><strong>Via a known vulnerability<\/strong>.&nbsp; White and black hat hackers are continually testing the integrity of software.&nbsp; White hat hackers will inform the software developer so they can fix it, black hat hackers will sell details of the vulnerability to anyone that wants to exploit it.<\/li><li><strong>Social Engineering<\/strong>.&nbsp; The easiest way to gain access to a website is to get someone to tell you their username and password.&nbsp; Cyber-attackers are exceptionally skilled in creating plausible approaches to website owners and administrators encouraging them to divulge usernames and or passwords.&nbsp; Be particularly suspicious of any request for a password reminder by another user on your site or a request by the \u2018hosts\u2019 for you to confirm the username and password for your site.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">How can I protect myself \/ my website?<\/h2>\n\n\n\n<p>A few simple precautions will go a long way to helping to maintain the security of your site.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Limit the number of users who have full Administrator rights to a minimum.<\/li><li>Enforce strong username and password requirements for all users.&nbsp; For WordPress this should mean\u2026<ul><li>Not using the default \u2018admin\u2019 username<\/li><li>Setting the public display for authors names to NOT be their username<\/li><li>Using long passwords \u2013 in excess of 15 characters<\/li><li>Ensuring that any password used is unique to that site<\/li><\/ul><\/li><li>If it is available, consider using 2 Factor Authentication (2FA) when people login to the site.<\/li><li>Put in place an application firewall or security tool.&nbsp; For WordPress, plugins like <a href=\"https:\/\/www.wordfence.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">WordFence<\/a> are a good place to start (though others are available).&nbsp; They are easy to install and even with the default settings, provide an enhanced level of security.&nbsp; The alerts and logs produced by these tools could give you enough warning that an attack is underway for you to step in and end it.<br>If you use another Content Management System (Drupal, Joomla etc), search for Security Extensions that will serve the same purpose.<\/li><li>Limit the number of failed logins and ban the IP address from where the login attempt originated.&nbsp; You \u2018might\u2019 inadvertently ban a legitimate user, but it is easy to unblock them if this occurs.<\/li><li>Get and keep your site UPDATED.&nbsp; Cyber-attackers are on the look out for websites that are out of date and those which have known vulnerabilities in outdated software.&nbsp; Why make it easy for someone to break in by leaving a weakness unaddressed?<\/li><li>Make sure you have a recent BACKUP of your site.&nbsp; Should the absolute worst happen, and your website be breached, knowing that you have a full and dependable backup you can revert to means that you have a level of insurance.<\/li><li>If you only login in from one location (e.g. home or your office) consider restricting logins to only the IP address associated with that location.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>Whilst you may believe that your website has little intrinsic value to a cyber-attacker, they may see it very differently.&nbsp; Your website is a platform for them to conduct a whole series of malicious and criminal activities IF they can access and take control of it.<\/p>\n\n\n\n<p>Be vigilant to what is going on with your website.&nbsp; Even if you have no proof, assume your website is (or will be) under attack and act accordingly.<\/p>\n\n\n\n<p>A few relatively simple steps can help to secure your website and give you peace of mind.&nbsp; Far better you act now to secure your site than spending hours (possibly days) trying to recover control, remove unwanted content, restoring the site and rebuilding your reputation.<\/p>\n\n\n\n<p>If you have any concerns over the security of your site or believe you have experienced a cyber-attack, QD Design can help.&nbsp; <a href=\"https:\/\/www.qd-design.co.uk#contact\">Contact<\/a> us for a free consultation.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It was widely anticipated that the invasion of Ukraine by Russia would see an increase in cyber-attacks.  We have seen a noticeable increase in failed intrusions to a number of sites that we manage.<br \/>\nFind out why this is happening and how to protect yourself and your website with a few simple steps.<\/p>\n","protected":false},"author":2,"featured_media":550,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/posts\/548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=548"}],"version-history":[{"count":5,"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/posts\/548\/revisions"}],"predecessor-version":[{"id":560,"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/posts\/548\/revisions\/560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/media\/550"}],"wp:attachment":[{"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.qd-design.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}