Website hacked? Here’s what you should do

Since 2021 won’t silence hackers around the world, I’m writing this short guide.
Hopefully it will help website owners to minimise the risk of data loss.

Red flags for compromised sites:

  • Domain is blacklisted by Google, McAfee, etc..;
  • Corrupted Google search results ( Japanese keyword hack );
  • Malicious random redirects to scam sites;
  • Host has disabled your website;
  • Readers complaining; and
  • You can visibly see that your site has been hacked;

Need help? Let us clean your site.

To secure a hacked website, follow these steps:

Step 1
Disable public access
1. To prevent further data loss, move all your web files outside public area ( public_html, www, etc )
2. Replace your index file with a temporary HTML page:
3. Check if you have other sites are hosted on the same account. If so, cross-site contamination risk is high.

Step 2
Backup site
1. Backup database and site files. If you can’t do it, ask your web host.
2. Make sure you have several backups available prior to the hack.
3. Secure all the backups on your computer.

Step 3
Secure your hosting account
1. Change cPanel/Plesk/Directadmin password, disable unnecessary FTP accounts, change MySQL user password.
2. Disable MySQL remote access, especially if you’re using Plesk.

Step 3
Malware cleanup
1. Hire someone to do it.
2. Ask for help:
Wordpress support:
Hacking subreddit :
3. If you have technical skills, perform the cleanup yourself. A cleanup guide which should work for most WordPress sites can be found here.

Important tips:
1. Don’t rely on automated software, because new malware is build around them.
2. If you’re using a hosting account managed by Hostgator, BlueHost, JustHost, HostMonster, iPower, iPage or any other EIG web hosting company, avoid their security solutions. Look elsewhere: Magefix, OneHourSiteFix, Sucuri, Upwork, Fiverr.