WordPress hacked – these two words strike fear and confusion into the hearts of WordPress owners.
A hacked WordPress website can mean loss of:
- Website Traffic;
- Brand Value;
And days worth of struggle in trying and failing to clean it up.
This is especially true for WooCommerce sites where you can literally see your store losing money in your dashboard!
The most confusing part is that you probably don’t even understand if your WordPress site is really hacked or not. WordPress can malfunction quite a lot.
So, most people do the logical thing and install a malware scanner plugin. Then they realise that most of them don’t do a good job of cleaning the site.
The worst part?
While you’re struggling to get your life back on track, the hacker expects you to fail at cleaning your site.
Time to hit the reset button.
In this article, we’re going to help you:
- Find out for sure if your site is hacked or not;
- Figure out what kind of malware has infected your hacked WordPress site;
- Clean your hacked WordPress site in 3 minutes;
- Understand the consequences of getting hacked;
- Learn how you can get infected and how you can prevent it;
We’re going to help you get back on track no matter what the situation is.
MalCare protects a network of 250,000+ business websites from critical malware infections and threats.
MalCare’s “one-click” malware removal is the only WordPress security suite that allows you to focus on your business and not on website security. We help businesses defeat hackers every time.
Now, cleaning your hacked WordPress site can be a very quick and easy process. Or, it can be annoying and frustrating. It all depends on the decisions you take to clean your hacked WordPress site.
Let’s dive in.
TL;DR: The most efficient way to fix your Hacked WordPress site is to use a WordPress malware removal plugin. There are other ways to do it, but we don’t recommend using manual cleanup methods as they can wreck your site completely.
Do You Really Have a Hacked WordPress Site?
We know that you’re confused.
Do you even have a hacked WordPress site?
The nature of WordPress is such that it can malfunction quite a lot. In many cases, the site isn’t hacked. It’s just… in regular trouble.
So, what’s an easy way to tell for sure that your site has been hacked?
Install MalCare’s FREE malware scanner.
- 1 minute to install;
- 1 minute to scan your site;
In 2 minutes, you’ll know for sure if your WordPress site hacked or not.
MalCare’s malware scanner is a super-lightweight WordPress plugin that creates a copy of your hacked WordPress site on a dedicated server. Once the copy is made, MalCare runs complex scanning algorithms to pinpoint the malware on your site.
This way, the scan is deeper and more accurate than any other malware scanner plugin.
The best part?
There’s absolutely no load on your server. Also, it’s totally free.
MalCare uses a learning algorithm to keep getting smarter over time by facing more malware. To date, MalCare protects 250,000+ sites and learns every day from that network.
Here’s what you need to do to scan your site for malware:
The entire process takes a couple of minutes at best. If MalCare suggests – you don’t have a hacked WordPress site, then you need WordPress troubleshooting advice instead.
But if MalCare says that your WordPress hacked, then you need to follow along with the cleanup process later on.
Either way, you need to scan your site first with MalCare.
WordPress Hacked: Common Symptoms Your Site is at Risk
Let’s diagnose your hacked WordPress site now.
We’re going to pinpoint the problem and find a way to fix it so that you can go back to making money again.
It’s highly likely that you found this article because of one or more of these symptoms.
We have articles on how to clean up common hacks and once we pinpoint your problem, we can talk about the solution.
Even if your hacked WordPress site has uncommon malware, there’s some good news:
“Almost all malware are variants of some other malware. Malware is just code at the end of the day. There are many ways to hack a WordPress site and many ways to infect it. But the ways in which hackers operate are almost always constant. Understanding the outcome is the best way to understand the hack – and then remove it”
– Akshat Choudhary, CEO of MalCare
In short: you need to find a way to clean your site to stop the hacker and take control of your life again.
Let’s take a look at the most common symptoms of a hacked WordPress site:
1. Google Chrome Shows A Warning When Visiting Your Website
One of the most telling signs that your site is hacked is to have Google Chrome tell your users that the “site ahead contains malware.”
A browser notification for hacked WordPress sites comes from Google Safe Browsing.
In fact, Opera, Chrome, Firefox, and Safari all use Google’s blacklist to verify compromised sites and notify users of malware.
A notification like this can instantly destroy your reputation and traffic. For WooCommerce sites, it can end your business completely.
If this is what you are going through, take a deep breath. We understand how annoyed you are right now. This is one of the most ambiguous notifications ever. It’s a very public notice that your website is hacked. At the same time, it says NOTHING about what’s actually wrong.
Then jump ahead to read how to clean a hacked WordPress website.
2. Google Search Console Sends A Message Saying Your Website Is Hacked Or Has Malware
If a major part of your business is SEO-driven, then you are no stranger to the Google Search Console. If Google detects malicious content on your hacked WordPress site, it will send you a message on the Search Console that looks like this:
So, what’s the problem?
The problem is that a hacked WordPress site is usually infected with malware that is very well-hidden. An HTML scanner isn’t enough to pinpoint the origin of the hack.
We recommend using a server-level scanner to uncover the real problem.
Sign up for MalCare for a one-click scan and it will find the most complex malware infections in 60 seconds.
Additional Resource: How to Remove Google’s “This Site is Hacked” Warning
3. Your Web Hosting Provider Disabled Your Website
Most hosting providers scan their web servers regularly for hacked WordPress websites. There are some telltale signs that hosting provider look for:
- Excessive usage of CPU resources
- Spam emails sent out in bulk
- Blacklisted domains on Google, Norton Safe Web, Spamhaus, etc.
And they usually send a very confusing email:
In certain cases, hosting providers even have partnerships with other hosting providers for regular malware scans. Check out this article on how MalCare provides Cloudways with bot protection.
If this is the situation you are in, then you need to act quickly before it’s too late.
Some hosting providers like GoDaddy will try to push their own security service on you. While this seems to be a decent idea, it’s really not. Most of these services will charge you a LOT of money each time you get hacked. It can also take weeks to get your site cleaned by a service.
In the meantime, your site will keep losing traffic, revenue, and brand value.
Read all about how MalCare has helped hacked WordPress websites on GoDaddy.
4. Outbound Ports 80, 443, 587 and 465 For Your Account Are Blocked
Hosting providers such as BigRock, GoDaddy, and HostGator will first issue a warning before they delete your site. When they send you a warning email, they will also lock down outbound ports 80, 443, 587, and 465 so that the malware on your site does not spread.
Most of their accounts are shared hosting accounts.
So, their first priority is to contain the malware and stop one hacked WordPress website from infecting the other sites on the same web server.
Again, if you haven’t already – scan your site for malware right away.
5. Users Complain About Their Credit Card Being Illegally Charged
WooCommerce users: If you have a hacked WordPress site on your hands, this is a big one for you.
You know for sure that your site is hacked if your customers are complaining about their credit cards being used without permission. WooCommerce databases store all the information a hacker would need to steal credit card information.
Usually, this is indicative of a backdoor in the code – an entry point in a hacked WordPress website that hackers can use to access your files and database anytime they please.
This sort of attack can come from absolutely any kind of malware that’s written well enough.
Jump straight ahead and learn how to clean your hacked WordPress site.
6. Your Emails Are Sent To The Spam Folder
If your email inbox sends out too many emails that are spammy, most email inboxes will send your future emails straight to the spam folder.
Hackers can use your hacked WordPress website to send a ton of spam emails to users around the world.
If your ‘Sent’ folder is full of emails that you DEFINITELY did not send, check out our article on what to do if your website is sending out spam emails.
7. Your Website loads Very Slow
Site speed is not a great indicator of malware. There are lots of things that can slow down a WordPress site. The simplest way to understand what’s happening is to head over to GTMetrix and generate a site speed report.
Pro Tip: Use the Waterfall chart to understand which components of your website take the longest to load.
If you see something out of the ordinary here, you may be infected with malware.
Some of the most common malicious attacks that slow down your site are:
The good news is that all these hacks can be cleaned up.
Just in case you feel a little lost: Don’t worry. It’s perfectly normal to feel a little overwhelmed. We’ve been in this business for over 8 years now. That’s why we don’t bat an eyelid at malicious code and different kinds of hacks. For someone new to this world, this can be a lot to absorb – especially if you’re dealing with a hacked WordPress website for the first time.
That’s exactly why we created MalCare.
Install MalCare’s full suite of security features to scan, clean, and protect your site 24×7.
If you noticed some ads and pop-ups that you didn’t put up yourself, then you need help right now. We’ve dealt with malware like that pretty often. This is another form of website defacement that we see a lot.
The worst part about adware is that it can siphon off a huge portion of your traffic. The long-term damage comes from the fact that these pop-ups can completely damage your reputation. A hacked WordPress website can show ads of illegal drugs, porn, and political hate.
Most ads and pop-ups come from SQL injection attacks. So, if you’re seeing unauthorized ads and pop-ups, you need to clean up your database.
IMPORTANT: Do not try to clean your database if you have a hacked WordPress site unless you have a lot of experience as a database administrator. It can completely wreck your site for good.
9. Your Website Is Being Redirected to Hacked Sites
We’ve already mentioned this before, but it doesn’t get any clearer than that:
Your WordPress hacked!
This can happen in many different ways. Mostly, it’s a redirection code in wp-config.php or .htaccess file.
Some of the possible symptoms include:
- Your site shows a blank page and doesn’t load
- Your site gets redirected to some malicious website
- Your site redirects you to Google
- Your site can’t be accessed by Google
- Your .htaccess file keeps getting modified
Check out our article on WordPress site redirecting to Spam for details on the malware and how to clean it up.
10. You See A Traffic Spike, Sometimes On Pages That Don’t Exist
Hackers can use a hacked WordPress site for ‘spamvertising.’
This causes an insane traffic spike. Spam emails are sent from your server with links to existing or new pages that are created by the hacker.
Spamvertising can vandalize blogs, websites, forums, and comment sections with hyperlinks in order to get a higher search engine ranking for the hacker’s website.
Of course, this doesn’t work anymore – anyone in SEO will tell you that.
It’s a very outdated blackhat technique that gets completely ignored by Google. But at the same time, the hacker who is filling your hacked WordPress website doesn’t really care about this. The malware will wreck your site all the same.
WordPress Hacked: Some Simple Diagnostics To Run
Apart from these symptoms, there are 4 simple diagnostics that you can run to see if your WordPress website hacked or not:
If you’re not a technical person, here’s what it can do to a hacked WordPress website:
Thankfully, this is one hack that can be pinpointed a little more clearly.
You’ve got one of these malware on your hacked WordPress site:
Be very careful!
These hacks eventually lead to website defacement. If you don’t take action now, you can lose control of the hacked WordPress site very quickly.
2. You Find Unexpected Error Messages In Your Error Logs
Not every WordPress user checks their error logs.
If you’re one of the few super-technical folks who can actually read and understand error logs, then there’s not a lot that you don’t already know.
All we can tell you is that you already understand fully well how much damage a hacker can do if they gain unrestricted access to your site.
Skip to the part where you learn how to fix your hacked WordPress website.
3. You Find New Admin Users Or FTP Accounts Which You Haven’t Created
This is a tricky one for big sites. It can be really difficult to keep an eye out for suspicious WordPress admin accounts and FTP accounts.
But if you’ve noticed this, then it’s time to check your WordPress core files. A hacked WordPress site usually gets infected in a way that can impact the entire site. This makes the WordPress core files the ideal target.
In some cases, there is a hidden executable code in files that look benign. Weirdly enough, it can even be hidden in a favicon.ico file! Just check out our article on WordPress hacked redirect malware. Fake WordPress admin accounts and FTP accounts are very common for such malware.
4. Files Have Been Recently Modified
With most malware, hackers first infect a hacked WordPress site with malicious code mixed in with normal WordPress code.
The simplest way to do that is to insert that code into WordPress files such as wp-config.php, .htaccess, and so on.
Editing the files on a hacked WordPress website is a recurring theme with malware such as wp-vcd.php. A simple precaution is to revoke edit permissions to your core files. However, if your WordPress site is already hacked, then you need to clean the site immediately.
Pro Tip: Do NOT delete anything from files and database tables unless you are 100% sure that it is malicious.
How to Clean a hacked WordPress Website?
There are two ways to remove the hack and clean a hacked WordPress website:
- You can use a malware scanner and cleaner;
- Or, you can manually dive into your website’s code and clean it.
For all intents and purposes, we never recommend doing a manual cleanup.
Why? It’s way too dangerous.
A hacked WordPress website usually has malicious code hidden inside the benign code without which the website would not function. Manually removing snippets of code can lead to permanently breaking the site.
You may think that you can restore your site from a backup using WordPress backup plugin. But how do you know if the backup isn’t infected as well? Does the backup even replace the infected files?
What we do recommend, however, is to use a WordPress malware scanner and cleaner plugin.
How to Clean Up Hacked WordPress site Using MalCare Security Plugin
The purpose of a malware scanner and cleaner is to make it easy to find, pinpoint, and clean an infected website.
The sad thing is:
- Most malware scanners can’t pinpoint the origin of a complex malware;
- They resort to crude methods of scanning that raise false alarms;
- After the scan, most security plugins require a manual cleanup;
- Manual cleanups are expensive and you pay through your nose when you’re in a pinch;
- And then you get charged extra for repeat hacks.
In short: The security plugin that is supposed to protect your website holds you up for ransom and then provides you with a flimsy solution at best.
That’s exactly why we recommend that you scan your site using MalCare.
MalCare offers a complete suite of security features that will scan, clean, and protect your WordPress site from malware attacks by hackers.
With the most advanced learning algorithms to support it, MalCare is by far the best WordPress Security Plugin there is that keeps getting smarter over time.
We know that this can sound a bit biased, so here are a few important stats about MalCare to remember:
- One-click instant malware removal in 3 minutes or less;
- 99% of malware are automatically detected and cleaned without any manual cleanup;
- Less than 0.1% false positives flagged across a network of 250,000+ websites;
- No extra charges ever and no B.S.;
- All for $99/year!
If this sounds good to you, we can make it better with just two words:
If you haven’t already, install MalCare and clean your hacked WordPress website today.
Here’s how you can do it:
Step 1: Sign up for MalCare
Sign up for MalCare WordPress plugin from our site.
Step 2: Scan Your Site
Use MalCare to Scan Your Site automatically:
Step 3: Clean Your Site in 1 Click
Click on ‘Auto-clean’ to clean instantly:
Once all this is done, you should definitely check out our guide on protecting your site from future attacks.
You get all this for just $89/year!
Join 250,000 other sites and install MalCare today.
How to Clean Hacked WordPress site Manually (NOT RECOMMENDED)
Cleaning a hacked WordPress site manually is made of primarily three parts:
- Scanning the server for malicious code in infected files;
- Scanning the database for malicious code;
- Detecting backdoors and fake WordPress admin accounts;
And then, remove malware from your hacked WordPress site.
This is an oversimplification, though.
In many cases, you may well have been blacklisted by Search Engines and blocked by your web host. In such an instance, it’s not enough to just clean your site, but also take measures to remove the website from a blacklist.
But let’s just get started:
#1 Looking for Malicious Code in WordPress Files and Folders
The most obvious way in which malware can be injected into a hacked WordPress website by a hacker is by uploading a file straight up. This is rarely the case, but worth a try.
Look for files that have a suspicious name. Start with the WordPress folders such as:
If this doesn’t work out, keep reading.
#2 Looking for Malicious String Patterns
Most malware leaves some common bits of code called string patterns across a hacked WordPress website.
So, the next step is to head over to WordPress files and search for these bits of code. Typically, you will find them in the core WordPress files such as:
CAUTION: Do NOT attempt this unless you understand PHP deeply. As you can see, almost all the files in WordPress are PHP files with the exception of .htaccess. Many of these strings could be part of regular code. Deleting something based just on this list could break your site.
Look for snippets such as:
- function wp_temp_setupx
- stripos($tmpcontent, $wp_auth_key)
If these two ideas didn’t work, we have some even more advanced ideas that you can try.
#3 Checking the functions.php File for infections
The functions.php file is one of the most popular targets in any hacked WordPress site.
So, take a quick look at that file too.
It’s difficult to say exactly what you should be looking for here. Depending on the malware, you could have different types of malicious code in the file.
You may want to check if the functions.php code is adding unauthorized features into a theme or a plugin. This is agonizingly difficult to find at the best of times and it’s desperately tricky to get right.
A few simple ways to check if the functions.php file has been tampered with are:
- If the hack is a very visible one like a hacked redirect, try changing the theme and check if the problem persists.
- Check and see if updating the theme resolves anything. Mostly it won’t help at all, but it’s worth a shot.
- Try logging into your WordPress dashboard. If you can’t, it might be because of malicious code in the functions.php file.
If any of these ideas show even a slight change, then you know that functions.php is a good place to start looking.
#4 Run a Diffchecker Against WordPress Core Files
A diffchecker is a program that checks two pieces of code and spots the differences between the two.
Here’s what you can do:
- Download the original WordPress core files from the GitHub repository.
- Download the files from your server using cPanel.
- Run a diffchecker between the two files.
The worst part about this idea is that you would have to go through each file on a hacked WordPress site one at a time and check for differences. Of course, you would then have to find out if the different code is malicious or not.
If this seems too technical or sounds like it’s too much work, we recommend that you install MalCare.
It’s a quick, easy, and affordable fix.
Why Did Your WordPress Site Get Infected or Hacked?
They say that prevention is better than cure.
We agree. But honestly, it’s not that simple when you’re talking about hacked WordPress websites.
Hackers create 300,000 new pieces of malware daily. This means that almost all security software out there becomes obsolete or irrelevant within days, if not hours.
Most hacked WordPress sites have one or more of these vulnerabilities:
- Outdated WordPress Version: Lots of web masters think that updating the WordPress version can break their site. This is true to a certain extent. But not updating WordPress on your site is a far worse idea. WordPress openly declares its vulnerabilities and outdated versions get easily exploited by hackers due to WordPress vulnerabilities. We recommend using a staging site to test out the updates and then roll it out after fixing all the bugs.
- Outdated themes and plugins: Outdated WordPress themes and outdated plugins usually have exploits that are very well document and easy for hackers to find. If there are updated versions out there, just update the software. It’s worth taking the time to do it.
- Pirated Plugins and Themes: If you’re using nulled or pirated plugins and themes, then 100% your WordPress hacked due to the vulnerable plugins and themes. Use a free alternative if you don’t want to pay for a plugins or themes. It’s that simple.
- Unsecured WordPress Login Page: WordPress login pages are easy to find and highly susceptible to brute force attacks. There is no protection against bots by default. The best you can get in an off-the-rack WordPress installation is a Multiple Login Attempts blocker. Honestly, it’s way too easy to get past those plugins as well.
- Weak Passwords: You’d be shocked how often it’s your own fault that you got hacked. The most common passwords are something weak like ‘[email protected]’ or ‘[email protected]’. It takes less than 1 second for a brute force algorithm to get past something like that. Do NOT trust simplistic rules like including numbers and special characters to judge password strength. Those measures are grossly insufficient.
- WordPress Roles: Do NOT leave the default WordPress user role as an administrator. WordPress has multiple user roles for a reason. If too many people have admin access, you are more likely to get hacked. The worst part? You’ll get hacked time and again without realizing why that’s happening to you.
- Ability to Execute Codes in Unknown Folders: Executable code, especially PHP code should only stay within trusted folders. Ideally, folders containing the WordPress core files, theme files, and plugins are the only folders that should have executable code.
- Running Website on HTTP: If your website is still running on HTTP and not on HTTPS, then you are simply inviting hackers to gift you a hacked WordPress site. And if you’re running a WooCommerce site without an SSL certificate, then God help you. Install an SSL certificate or risk having all your information stolen.
- Setting Incorrect File Permissions: This may seem inconsequential, but incorrect file permissions can give hackers the option to write code into an unprotected file. All your WordPress files should have 644 value as file permission. All folders on your WordPress site should have 755 as their file permission.
- Unprotected WordPress Configuration wp-config.php File: The wp-config.php file loads up whenever someone tries to log in to your site and it contains all your database credentials. If left unsecured, a hacker can gain access to your database using the file. It’s a simple enough fix, though. Just add this little code snippet to your .htaccess file:
- Changing the WordPress Database Prefix: The default WordPress database prefix is ‘wp_’ and you can change this during the installation of WordPress on your site. Leaving this unchanged makes it really easy for hackers to guess your database names. So, we highly recommend changing the database prefix in the wp-config.php file.
As you can probably understand, there are way too many ways in which you can get hacked.
But as general rules:
- Install a powerful firewall and bot protection for your website
- Install an SSL certificate that will protect your site from further attacks
- Stop using nulled WordPress themes and plugins
- Do not trust any vendor implicitly – always check the URLs for everything you do
- If you ever suspect any foul play at all, scan and clean your website immediately
Honestly speaking, most malware doesn’t start damaging your hacked WordPress site immediately. If you can scan and find malware early on, you can successfully remove it without causing any damage at all.
For this purpose, we highly recommend that you scan your site for malware right away.
Post-Hack Measures: How to Prevent Your WordPress Site From Being Infected
The rest of this article is about stronger security measures that you can take to protect your website from malware attacks. We’ve also explained some of the most common security jargon so that you don’t feel lost with some other resources.
Feel free to go through them all and if you have any questions, drop us a line.
Install a Firewall to Keep Out Malicious Traffic from Your Site
A firewall is a layer of protection that shields your website from incoming traffic. It acts as a barrier between a trusted and untrusted network. In this case: a barrier between a bot and your site that prevents hacked WordPress sites from ever coming into existence.
In simple terms: if your website is getting any malicious traffic or attempted hacks, a firewall prevents the website from receiving such traffic.
A WordPress firewall is specifically designed to protect WordPress websites from getting hacked. It runs between your site and the internet to analyze all the incoming HTTP requests. When an HTTP request contains malicious payload the WordPress firewall drops the connection.
Just as a malware scanner looks for malicious malware signatures in hacked WordPress websites, a WordPress firewall will scan for malicious HTTP requests.
Some rare firewalls like the one we use in MalCare can actually learn from previous attacks and get smarter over time. MalCare can analyze incoming traffic and recognize a malicious IP from a huge database it has compiled by protecting 250,000+ sites.
Once an HTTP request is flagged by MalCare as suspicious or malicious, your website won’t even load WordPress. It’ll be as though there WAS no malicious traffic.
Pro Tip: MalCare actually logs all attempted connections with your site in the traffic logs. So, if you’re using MalCare, try to keep tabs on the type of traffic you’re getting. Every login attempt is color-coded so that you can analyze it at a glance.
The two most common hacks that installing a firewall can protect against are brute force attacks and DDoS attacks. Let’s go over both in brief so that you know what to expect from them.
What is a Brute Force Attack?
A brute force attack is a way of guessing your access credentials by literally using every possible password there is. It’s a simple and inelegant hack. The computer does all the hard work and the hacker sits tight waiting for the program to do its job.
Typically, a brute force attack is used for two purposes:
- Reconnaissance: A bot uses brute force to find vulnerabilities that it can exploit
- Infiltration: A bot tries to guess the access credentials to gain control of the hacked WordPress website
The most primitive type of brute force attack is the dictionary attack where the program uses a list of password combinations based on certain assumptions about the password.
A weak form of dictionary attacks is credential recycling where it uses WordPress usernames and passwords from other successful hacks to try and break into your website.
But the more modern variant is an exhaustive key search. These kinds of brute force attacks literally try out every possible combination of all possible characters in a password.
Pro-Tip: An exhaustive key search brute force algorithm can crack an 8-character password with capital and lowercase letters, numbers, and special characters in two hours. Always create long, random passwords with a good mix of characters to make it more difficult.
Attackers also use brute force attacks to look for hidden web pages. Hidden web pages are live pages that are not linked to other pages. A brute force attack tests different addresses to see if they return a valid webpage, and will seek out a page they can exploit.
Bonus Pro-Tip: If you see a sudden uptick in traffic for no apparent reason, check your analytics. If you see a bunch of 404 errors from pages that don’t exist, you’re probably under attack by a brute force bot.
You can prevent a brute force attack by:
- Using longer passwords
- Using more complex passwords
- Limiting login attempts
- Implementing Login Page Captcha
- Setting up WordPress Two-Factor Authentication
This goes without saying, but you also need a seriously powerful firewall for your WordPress website. A firewall on top of all these preventive measures will help you protect your business from hackers trying to brute force their way in.
As an alternative to all this, you can install MalCare. MalCare comes with a built-in premium firewall that spots suspicious traffic and prevents your website from even loading the WordPress login page.
To learn more about Login Protection checkout our Guide on WordPress Login Security.
What is a DDoS Attack?
A distributed denial-of-service (DDoS) attack is a malware attack that sends too much traffic to your WordPress website for your server to handle.
Hackers don’t hack just one website or device. Instead, they establish an entire army of hacked devices and websites to direct focused DDoS attacks.
The collection of compromised devices used for a DDoS attack acts on an internet called a botnet. Once a botnet is established, the hacker remotely sends instructions to it and causes other servers to be overwhelmed by a huge surge of traffic.
Pro-Tip: If your website is loading very slowly or if your web host refuses to serve your website, check your analytics immediately. DDoS attacks work in patterns that can be discerned:
- Traffic originating from a single IP address or IP range;
- Traffic from users who share a single behavioral profile, such as device type, geolocation, or web browser version;
- An unexplained surge in requests to a single page or WooCommerce endpoint;
- Traffic spikes at odd hours of the day or a spike every 10 minutes;
These are all symptoms of a DDoS attack.
One of the major motivations behind a DDoS attack is extortion under the threat of destruction of property. The only way to prevent a DDoS attack is to use an effective firewall that can clamp down on suspicious traffic immediately.
Install an SSL Certificate to Secure Your Traffic
SSL Certificates are now the staple for almost all cPanel hosting providers and resellers. An SSL certificate is a small digital file that encrypts an organization’s details. Commonly, SSL certificates, when installed, binds:
- A domain name, server name, or hostname;
- And the organization’s identity and location.
This secure connection ensures that the traffic between the server and the browser is encrypted.
Before we get into the kind of security an SSL certificate provides, let’s understand how it works.
SSL certificates use a method of encryption called public key cryptography.
Public key cryptography uses two sets of keys for encryption – a public key and a private key. It’s in many ways similar in concept to WordPress Salts and Keys.
In this kind of encryption, if:
- Angelina sends Brad a message, then the message is locked using Brad’s public key.
- But for Brad to read the message, he must unlock it using his private key.
If a hacker intercepts the message without having Brad’s private key, they will only see encrypted code that not even a computer can decrypt.
What is Man-In-the-Middle Attack?
A MITM attack is when a third party intercepts a communication between two people. Here, the hacker is essentially a ‘man in the middle’.
This might sound all fun and frivolous, but this is a very dangerous attack. The hacker can effectively see every request coming in and out of your website including all transactions.
If the hacker can’t get admin account access, they can send your users fake web pages that can grab their access credentials.
Imagine this for an instant:
The credit card, the phone number, the email address – everything your users submit on your hacked WordPress website is openly accessible to a hacker.
The simplest way to protect against attacks like this one is to install an SSL certificate.
Pro-Tip: Check all your web pages for the ‘https’ in the URL. If there are pages missing out on that, you may have a mixed content issue. Fix that as soon as possible. A brute force attack could find the vulnerable pages and push for a MITM attack.
Implement WordPress Hardening and Basic Hygeine
This segment is all about protecting your WordPress website from getting hacked again.
Now, the simplest thing you can do is to implement WordPress hardening measures. Hardening makes sure that even if your website gets hacked again, the hacker can’t really edit any files and databases.
Another major tip we have: stop using nulled WordPress themes and plugins. Nulled themes and plugins are essentially cracked versions of the plugin. The only problem is that nulled themes and plugins are usually chock full of malware.
Also, if you are using a lot of plugins, be careful of zero-day vulnerabilities. A zero-day vulnerability is essentially a security flaw that the developers and vendors know about, but haven’t really fixed. Many hacked WordPress websites have plugins with zero-day vulnerabilities.
The most troubling part about a zero-day vulnerability is that people assume that updating the plugin or theme can automatically fix the hacked WordPress website. That’s not true, though. You will have to clean up the website first and then update the software to prevent future hacks.
WordPress Site Hacked: What Are The Consequences?
One of the major questions that we get all the time is – why does it matter if my website gets hacked? Unless it completely defaces the website, why should I even care?
Short answer: you really should care because a hacked website can severely damage your business even if it isn’t visibly defacing your website.
A WordPress hack can damage your traffic, revenue, and brand value (more on this soon).
But the biggest reason to care is:
Almost all malware is created with the intent to make money off your hard work.
In essence, you spend a lot of time and money on building traffic and revenue, and then because your WordPress website hacked, the hacker makes money instead of you.
How Hackers Make Money Off Your hacked WordPress Site?
Hackers make money from your website by using your traffic and here’s how it works:
- Illicit ads and pop-ups redirect a huge portion of your traffic to other sites and the hacker gets paid for that traffic.
- URL redirections work in the same way – the hacker can redirect the traffic from your hacked WordPress website to make some quick cash.
- If a hacker gets into a WooCommerce website, they can steal the credit card information of your buyers.
- In some cases, a hacker can redirect to a page that looks like yours. When people buy something from the fake page, the hacker gets paid and you never get to know about it.
- A hacker can easily replace a bank account linked to your WooCommerce store. You’ll still make the sales number, but the hacker steals all the money.
Let’s put this into perspective:
It’s not just you who’s getting hacked. And it’s definitely not just you who’s unprepared for a hacked WordPress website.
People in America panic a lot more over cybersecurity than personal security:
Image source: news.gallup.com
A study of more than 4,000 organizations across the US, UK, Germany, Spain, and the Netherlands found that 73% of companies are not ready for a cyber attack. (Source: hiscox.co.uk)
We know this sounds bad. But honestly, this is just the tip of the iceberg with hacked WordPress websites.
Believe it or not, it actually gets much worse in the long term.
In the long term, a WordPress hack can:
- Completely stop traffic to your business because it got blacklisted
- Destroy your brand’s reputation because no one wants to be a victim of cybercrime
- Essentially destroy your revenue channels by destroying trust and stealing traffic
That’s not even the worst part.
The worst part is that the hack may not even have visible consequences. You might be getting robbed on a daily basis without ever knowing it.
Now, maybe a security plugin flags a malware along with 10 other false alarms. And maybe you do see it. How often do you take action and check out all the alarms?
And even if you do find the malware and clean it, even if you miss a single backdoor on your hacked WordPress website, you can get infected all over again.
The simplest way to get out of this vicious cycle is to install an automatic malware scanner and removal tool.
Now that you know how to scan and clean a hacked WordPress website, just take the time to set up security measures to prevent future hacks. You have successfully defeated the hacker. You can now go back to building your business after you set up the basic security measures.
Bonus Tip: You can set up WordPress hardening manually or install MalCare and do it in 3 minutes or less.
It’s time to take a sip of hot, steaming tea and relax – especially if you’re a MalCare user. You never have to worry about WordPress security again.
If you have any questions, feel free to drop a comment below. We have a team of WordPress security experts who can help you resolve any issue you might face.
Until next time!