Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

What to Do If Your Website Has Been attacked with Malware

Author: Abue Sayed
by Abue Sayed
Posted: Nov 20, 2022
new virus

Step 1: Scan your website for malware:

This is an obvious prevention, but one that is generally overlooked by most people. Most of the customers we talk to who have been hacked have not previously had any security products installed on their computers, and those that do, more often than not, are installed out of the box, barely configured, forgotten, and rarely updated.

Unless you have a decent virus/malware installed on your desktop. Make an informed purchase by discussing your specific needs with different vendors. Make sure it is set to automatically scan your device every day. Ensure that it connects to the vendor's website at least weekly and updates itself with new virus and malware definition libraries.

For bonus points, install software that allows you to monitor network traffic and where you see odd outgoing requests, investigate. Your computer should never contact the outside world without you explicitly taking action or setting up something like regularly downloading new virus definitions. If your computer is randomly connecting to addresses or sites you don't know about, then "Houston we have a problem!"

If you not found you need to get any Maleware Removal Service.

Step 2: Rotate FTP passwords:

File Transfer Protocol (FTP) provides full access to your files on the server. Like all passwords, you shouldn't set them and forget them. They should be updated regularly. We recommend monthly if you access your FTP regularly, but if you access it less frequently it should be fine. If you have never changed your passwords, we recommend that you update them now! You should also have a sensible password policy.

It includes:

  • DO NOT use the same passwords for everything
  • DO NOT use dictionary words or people's names
  • DO NOT reuse the same passwords. Throw away after use and roll up!
  • USE a random password generator
  • USE at least 8 characters
  • USE a combination of uppercase, lowercase letters, numbers and symbols.
Step 3: Rotate the database passwords:

A database password allows your site to access your database. It's not as important as changing the administrator password for your application or FTP details, but it's still an important part of a well-managed password policy. We recommend changing your password every two months, although you may want to look for more or less depending on your specific circumstances.

The most likely scenario if database access is compromised is that a bad person could create a new administrator for your site, delete your database entirely, or modify the content that is stored and served from the database. If you change this password through a management interface such as Webgyan Console or c Panel, you must note that your website must have a new password configured. Generally, you will have an interface for this, or some applications require editing a text configuration file on the server. It sounds complicated, but once you get the hang of it, it's a 5-minute task.

Step 4: Remove Access Details:

If you took your car to a mechanic and left spare keys for them to work on, you wouldn't leave the keys with them when they picked it up. Why would you leave full access to your site after work or changes are complete?

You should only provide access information based on your intended use. When you're done, go through steps 2, 3, and 14. If you've granted console access at the domain level, go through step 5 as well.

Some of you don't outsource your development work and have dedicated IT staff. Whenever an employee with a certain level of access leaves, you should reset that data immediately. Remember, you're not doing this because they might do something nasty on purpose, in fact it's generally unlikely, but as a precaution in case their computer is ever exploited or compromised in the future.

We back up data so that in the event of a crash, we are able to get all customers back online.

Step 5: Turn on "TheConsole" (or cPanel) passwords:

This is a very easy step. Simply follow the instructions to reset control panel passwords. Use the same common sense as described in step 2 to set a more difficult password.

Step 6: Subscribe to external monitoring:

It's like insurance. Companies like Secure do a number of really neat things for you. They scan your site every day and notify you immediately if you've been hacked. They offer services where they clean up your site if you get compromised and need immediate help. If you're using WordPress, they'll do the preventative monitoring for you, so you'll be notified of updates to the app, plug-ins, themes, and the like.

Step 7: Backup your web files:

There is an idea that your hosting provider will have backups ready and waiting for you to access and can immediately restore all your lost data without any charges. Generally speaking, hosting providers don't do backups for the reason you think. We back up data so that in the event of a crash, we are able to get all customers back online. The deposit sizes we deal with are in many Terra flats. Therefore, I recommend a BACKUP as hard as possible!

It's a simple task that will save you a lot of headaches later. There are even apps that can back it up. Backups don't have to happen every day, but for a busy site, weekly backups should be part of your strategy. For websites that are static and change very infrequently, monthly backups are more appropriate. No matter what schedule you choose to follow, if bad things happen, you'll at least have a copy of your site and can easily republish quickly, hassle-free, and without charge. So what are you waiting for? If you've never backed up, do it now and come back!

Step 8: Backup the database:

This is simply an extension of step 7. If you have a site that registers new users, such as an e-commerce site that requires customers to register before making a purchase; you most likely sell to them, run a loyalty program, or have some kind of rewards system. What would happen if all this data was deleted? If you have a busy site, you may decide that weekly is too infrequent and choose to archive a copy of the database daily.

Again, there are many tools available that will do this for you automatically, especially if you are using a very common database technology like MySQL. Restoring from a custom backup takes 5 minutes. If you let your hosting provider go through the archives and do the restore, you'll be off the air for a few hours at best.

Step 9: Check the software for repairs:

You should proactively keep your website as up-to-date as possible. This seems obvious, but it's probably the most common way a site can be abused and is largely ignored. It is safe to say that most people tend to forget to update their website, the usual process is for the developer to create the website and then hand it over to you and that would be the last

About the Author

Website Security & Wordpress malware removal service available for your website. We have clean Hundreds of infected website from malware.

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Abue Sayed

Abue Sayed

Member since: Nov 17, 2022
Published articles: 1

Related Articles