Currently, multiple servers are undergoing heavy WordPress brute force attacks which are causing instability for some servers and a heavy load on those servers services, leading to outages and downtime. Our Tech team is continuing to work on filtering and shielding these servers from these attacks, and due to the nature of the issue we do not have an ETA when the servers will return to normal operation at this time.
Currently, we have a forum thread posted at:
to keep those affected updated on the situation, and we will update that thread as the issue progresses.
For more information about this type of attack, why it is perpetrated, and what it’s ultimate goal is you can read this article, which explains in layman’s terms the attack, and its affect on web servers. http://krebsonsecurity.com/2013/04/brute-force-attacks-build-wordpress-botnet/
We again encourage you to utilize best practices with your WordPress site, which include:
– choosing a username other than admin
– choosing a secure password: http://en.support.wordpress.com/selecting-a-strong-password/
– restricting access to wp-admin: http://codex.wordpress.org/Hardening_WordPress
– ensuring your WordPress is always up to date.
We will continue to work to mitigate this attack, and we thank you for your patience.
Welcome back to the HostNine Reseller Newsletter. Got a question?
Reply back to firstname.lastname@example.org and someone will respond ASAP.
Need support? You can contact our support team 24/7/365.
A special thank you to all of our customers for your patronage throughout 2013.
We can’t wait to share what’s in store this year. Have a great 2014!
Cloud VPS Double RAM Sale Ends Monday!
There’s still time to get twice the RAM for FREE on any new HostNine Cloud VPS plan. No code required.
Sale ends January 6th!
Click here to check out all of our Cloud VPS plans.
Important ICANN Announcement!
Please read this important announcement from ICANN carefully!
It details a few new regulations and procedures for ICANN’s Registrar Accreditation Agreement.
Click here to read the announcement.
Earn $ With The HostNine Affiliate Program
Check out the HostNine Affiliate Program! You can always earn a little extra cash by recommending our services to others, whether you’re a customer or not! It’s free to sign up, too. Learn all about it here.
The HostNine Team
Please read this important announcement carefully! The following post details new regulations and procedures for ICANN’s Registrar Accreditation Agreement:
VALIDATING REGISTRANT EMAIL ADDRESSES
Starting in January, the registrant contact will need to be validated upon the purchase or transfer of a domain name or if the registrant’s first name or last name has been modified.
Should any of these occur, OpenSRS , our registrar, will send an email requiring an affirmative response from the registrant. Failing to receive an affirmative response from the registrant within 15 days will result in the suspension of the name. This means that the domain (and any related services) will be offline.
If a registrant has already validated their contact information, this process will not be initiated.
The same validation process will take place if a WHOIS Data Reminder Policy (WDRP) notice, 30 day expiration notice or 5 day expiration notice bounces. It is extremely important to ensure the WHOIS data that you provide for your domain is correct.
ICANN WEBSITE REQUIREMENTS
ICANN now requires that we list the following new pieces of information on your website:
• ICANN’s Registrant’s Benefits and Responsibilities
• ICANN’s site for registrant education
We hope that these changes in ICANN policy will have little effect on the ease in which you are able to order domain registrations or transfers. Please contact our billing department with any questions or concerns.
On Monday, Dec 16th 21:00 – 21:30 EST we will be continuing maintenance on our network equipment at Dallas facility. This will include switching from our copper links to much faster and more stable fiber based links. The end result will be better scalable bandwidth and much better DDoS attack resilience.
These operations are expected to be fully transparent and they shouldn’t cause any noticeable downtime. If you notice any connections issues after this maintenance is done, please contact our Support department.