Over 100,000 word press sites have been compromised recently. The attacker used the XML RPC vulnerability to take control of the word press websites and than use these sites to launch DDoS attack over the other legitimate sites. The attack was first discovered by the Security Scanning website called SECURI as they were trying to track the source of a DD0S attack.
The attack can be avoided by disabling the XML RPC service using the word press admin panel. Following is the step by step instruction on how that can be achieved.

1. Just go to the wordpress admin panel

2. Click on the Settings->writing option

3. unchecked the option give in the screenshot

4.remove the link “http://rpc.pingomatic.com/”settings_writing

5. save the settings

This will most certainly remove the possibility of exploiting the XML RPC service to use this site for attack.