Suspected 360 Website Scanner Triggered Simulated Attack on My Blog

360 website scannerWordPress spam commentssecurity vulnerability scanfake hacker attackWordPress comment protection
Published·Modified·

After disabling Duoshuo last week and switching to WordPress's built-in comments, I suddenly encountered a surge of spam comments and continuous injection attempts. Fortunately, WordPress's security held firm, rendering the injection attacks completely ineffective.

Hacker

The attacker used the nickname "8888" and the email "hacker@hacker.org". The attack lasted for over half an hour, resulting in more than 50 spam comments, all of which were injection attempts. Initially, I suspected a human attacker and blocked the IP address, which immediately stopped the attack.

Later, after communicating with other users, I discovered that this was not an isolated incident. Many others had experienced similar phenomena. Some friends suggested it was a simulated attack by 360 to test for website vulnerabilities. I checked the 360 Webmaster Tools and confirmed that the detection time perfectly matched the attack timeline, making it highly likely that 360 was responsible.

However, a question remains: 360 claimed the website scan took only about 4 minutes, yet the simulated attack lasted over half an hour (it stopped only after I blocked the IP; I don't know how long it would have continued otherwise). What is the point of this? Moreover, 360 did not notify me that a simulated attack was conducted on my site, which feels highly unethical. Could this be a deliberate tactic by 360 to encourage users to purchase their "Website Guardian" service?

If you encounter similar situations, I recommend taking immediate protective measures. Please refer to the article: How to Effectively Stop WordPress Spam Comments.