Holiday special offer! 50% discount for all plans. Use Code blackfriday24 at checkout.
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

WordPress Website Hacked What do you do

There are various situations when a WordPress website can be hacked. The most typical one is when the WordPress website simply redirects to another site. This is known as the redirect hack.

There are various infections of how this hack is done and what files, properties or configuration is maliciously changed, but ultimately somewhere there is a redirection happening on the site to redirect it to another website most likely spammy.

A typical hack is when the siteurl in the wp-options table is maliciously changed. To verify this you would need to connect to the database with a tool such as phpMyAdmin and access the wp_options table. The value of the siteurl field should be the address to the website. If this is changed then the website will redirect to such a URL. Hackers typically find weaknesses in plugins where the siteurl property can be updated.

If this is the case then the solution can be simple and the site can be restored by switching back the value of the siteurl to the correct value. However this is not enough. The following are subsequent items you should do:

  1. Update WordPress (if there is a pending update)
  2. Update all WordPress Plugins
  3. Check installed plugins. Uninstall any not required.
  4. Scan the website for malware

Typically having plugins updated to the latest version is enough to solve the issue for good, assuming that there was a plugin that was vulnerable. If there was a malicious plugin, making sure that the ones installed are legitimate also solves the issue.

Ultimately a monitoring solution such as Netumo can identify when such an event occurs. Netumo follows the site redirection and then matches a substring in the returned content with the HTML Code to Match parameter within the monitor. If the result does not match then Netumo will alert with a NoMatch alert.

In such situations being alerted immediately when such an issue happens is important to avoid reputational damage and resolve the issue quickly. Having the issue remain there can result in the website being added to blacklists which could be much more difficult to remove.

Signup for Netumo today for a free trial, for 30 days. Starting monitoring is easy and quickly without requiring any technical knowledge, just enter the URL and the HTML to Match section with a small piece of content from the website.

Related Posts