Media Temple drops the ball – again

posted in: social media | 4

A second attack on MediaTemple servers has finally given me the incentive to move MediaTemple used to be “the” host to have, especially if you did Flash work. They had a reputation for being solid.

Two months ago thousands of blogs hosted by MediaTemple were attacked. This is not new in the hosting world. Last year millions of Go Daddy hosted WordPress blogs were hit. The shame of it is that MediaTemple suspected an attack three days before it was executed (meaning they discovered a security vulnerability being exploited) .

Had they sent an email to accounts with WordPress blogs, there could have been much pain alleviated.

This blog is relatively small and only gets posted to a few times a month. However, also on this same account is the blog of my virtual world partner, Ener Hax. The iliveisl blog is a substantial blog, often with several posts per day. There are also five authors on that blog.

The iliveisl blog enjoys very high SEO (99.6%) and is in the top 3% of all web traffic. Hundreds of people read it daily.

So when an attack happens that injects an aggressive malware redirect into every single post, something has to be done. Ener Hax spent hours that first night manually stripping out the malicious code. The code was inserted into over 600 posts!

Had MediaTemple provided the heads up, measures could have been taken to reduce the damage. Ener does weekly backups, but missing 3 or 4 days could mean the loss of 5-10 posts.

MediaTemple never admitted to having a security issue, preferring to blame it on blog owners and outdated versions of WordPress. Anyone that knows Ener would know that “outdated” is not part of any online endeavors done by Ener!

They did supply instructions for stripping out the malicious code in the SQL databases a few days later.

Attacks like this will happen. Not warning your customers and/or not stepping up to the plate to say there was a breach is ethically poor. People understand that this happens on the internet, but they don’t like being lied to.

MediaTemple has not been in the top ten web hosting providers for a few years now.

This week, another attack happened on websites hosted by them. Malware HTML was injected into index pages. I submitted a work ticket and was automatically informed that there would be a 20 hour response time.

After the WordPress attack occurred, we moved the iliveisl blog to Host Gator. Their ticket response time has been under two minutes! They also have a reputation of being proactive regarding attacks and are consistently in the top ten hosting providers. They are also powered 110% by green sources!

This site, as well as a few others we have, was scheduled to be moved in the next two months. Looks like we should have moved a bit sooner! is now on Host Gator and they have a wonderful control panel and for under $12 a month (Business Plan) we get unlimited domains, unlimited bandwidth, and unlimited disk space.

This is the third host we have used (we have about 25 websites). The first, WebScorpion, was rock solid but was $37 a month for 20 domains. I used them for 6 years (an eternity online) and only had one hour of downtime that I know of.

MediaTemple was used for three years and our plan allowed for 100 websites and 100 gigabytes of disk space but I know of at least four days where this site was down for hours at a time! Once for six hours! That is a long time by any hosting companies standards, but it did result in a credit for a free month.

If you are looking for a host, we have been happy with Host Gator so far and they have a very easy “one click” type of installer for things like WordPress.

Spend a few minutes researching online and good luck!

code used just in case others Google it looking for what happened:

<ads><script type=”text/javascript”>document.write(unescape(‘%3C%73% . . . ‘));</script></ads>

from Google about this and MediaTemple’s network:

Yes, this network has hosted sites that have distributed malicious software in the past 90 days. We found 14 site(s), including, for example, pqshow,org/, crocro,biz/, adsnet,biz/, that infected 11077 other site(s), including, for example, stumbleupon,com/, latingossip,com/, larecord,com/.