Good day everybody
I am a web designer and maintain 26 domains. I am the only person with cPanel login details from a front-end perspective. I don't have access to the backend of cPanel being an end-user, so I need some advice from you clever people please.
During the past 2 weeks, half of the domains were accessed via cPanel by the same IP address. This person proceeded to create a sub-folder and upload a fake portal/script for online banking. The same pattern is followed in all of the compromised domains.
What I have seen:
.lastlogin records show the bad IP address login time and date
Raw Access files show the files that were uploaded by bad IP address
He/She used a gmail and yahoo account to send a test message from the server
WordPress firewall logs show no indication of brute force entry
What I have in place:
I use 30 character auto generated passwords for cPanel
Two of the compromised domains have no website (ISP keeps telling me to update WP)
File permissions do not exceed 750
The WP sites all have firewalls and 2FA logins with strong passwords (WordFence and iThemes)
WP sites are updated
The ISP blames me for the breach. I need to know how this happened to prevent it but they are not helpful at all.
What information do you wonderful clever people need from me to ascertain what happened and how to prevent it? Needless to say, this experience hurt my business and that of my clients.
Thank you!
Barbara
I am a web designer and maintain 26 domains. I am the only person with cPanel login details from a front-end perspective. I don't have access to the backend of cPanel being an end-user, so I need some advice from you clever people please.
During the past 2 weeks, half of the domains were accessed via cPanel by the same IP address. This person proceeded to create a sub-folder and upload a fake portal/script for online banking. The same pattern is followed in all of the compromised domains.
What I have seen:
.lastlogin records show the bad IP address login time and date
Raw Access files show the files that were uploaded by bad IP address
He/She used a gmail and yahoo account to send a test message from the server
WordPress firewall logs show no indication of brute force entry
What I have in place:
I use 30 character auto generated passwords for cPanel
Two of the compromised domains have no website (ISP keeps telling me to update WP)
File permissions do not exceed 750
The WP sites all have firewalls and 2FA logins with strong passwords (WordFence and iThemes)
WP sites are updated
The ISP blames me for the breach. I need to know how this happened to prevent it but they are not helpful at all.
What information do you wonderful clever people need from me to ascertain what happened and how to prevent it? Needless to say, this experience hurt my business and that of my clients.
Thank you!
Barbara