SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
WHAT TO DO
WHEN YOUR
WEBSITE IS
HACKEDTHINGS YOU NEED TO
KNOW & FOLLOW
Your website is hacked,
what will you do now?
There are thousands of websites that get
hacked, and the owners get it back in their
original form.
Apprise your Web Hosting
company
Very first need to know that your website is
hacked is the hosting company of your site.
In most cases, your web host will be able to
fix this.
In case if your host is not able to help you out,
try to find out somebody who is specialized in
retrieving hacked website.
Quarantine the website
The next most important step is to turn off
your website and quarantine it offline till
you are sure the problem is fixed.
Analyze the attack?
A hacker can attack your site in a
number of ways:
Check out how bad the attack was,
this can be done by looking at the
information in the Massage Center in
the search console.
Check for the File
System
This is for more in-depth investigation, to
find out the maximum damage the
hacker could have done to your website
includes modifying the website and other
file systems.
Identify the vulnerability
Now analyze your website for
vulnerability, there may be more
than one to be fixed.
Fix all the errors. Keep searching for
the odds, and ensure that the
antivirus has scanned all the
vulnerabilities.
Maintain and clean your
website
Keep your website clean and updated. Secure it
with the best security software like cWatch and
never miss to perform the maintenance.
Clean your server
Clean the site’s content on the new
backup file system, but make sure
this is not on the server.
Map your performance
Make sure you do have a long-term
maintenance plan and not paying attention
will expose you to even more attacks in the
future.
Google Review
When attacked for phishing, makes a
review at
google.com/safebrowsing/report_error/
THANKS A
LOT!

Más contenido relacionado

La actualidad más candente

Hack miami emiliocasbas
Hack miami emiliocasbasHack miami emiliocasbas
Hack miami emiliocasbas
Emilio Casbas
 
Defendingwebservices
DefendingwebservicesDefendingwebservices
Defendingwebservices
Aung Khant
 

La actualidad más candente (19)

Hack miami emiliocasbas
Hack miami emiliocasbasHack miami emiliocasbas
Hack miami emiliocasbas
 
Web Development Security
Web Development SecurityWeb Development Security
Web Development Security
 
Hosting
HostingHosting
Hosting
 
How to Boost Your Magento Store Security?
How to Boost Your Magento Store Security?How to Boost Your Magento Store Security?
How to Boost Your Magento Store Security?
 
Level Up Your WordPress Security
Level Up Your WordPress SecurityLevel Up Your WordPress Security
Level Up Your WordPress Security
 
Secure Code Warrior - Authentication
Secure Code Warrior - AuthenticationSecure Code Warrior - Authentication
Secure Code Warrior - Authentication
 
Protect from ransomware
Protect from ransomwareProtect from ransomware
Protect from ransomware
 
The Ultimate Guide to Wordpress Security
The Ultimate Guide to Wordpress SecurityThe Ultimate Guide to Wordpress Security
The Ultimate Guide to Wordpress Security
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security ppt
 
Protect your pc
Protect your pcProtect your pc
Protect your pc
 
The Cyber Attack Risk
The Cyber Attack RiskThe Cyber Attack Risk
The Cyber Attack Risk
 
Web security by khubaib
Web security by khubaibWeb security by khubaib
Web security by khubaib
 
Defendingwebservices
DefendingwebservicesDefendingwebservices
Defendingwebservices
 
How to Easily Secure Your WordPress Website
How to Easily Secure Your WordPress WebsiteHow to Easily Secure Your WordPress Website
How to Easily Secure Your WordPress Website
 
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
 
WordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdfWordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdf
 
Open Source CMS : How secure are they?
Open Source CMS : How secure are they?Open Source CMS : How secure are they?
Open Source CMS : How secure are they?
 
8 Password Hygiene Tips to Protect You and Your Company
8 Password Hygiene Tips to Protect You and Your Company 8 Password Hygiene Tips to Protect You and Your Company
8 Password Hygiene Tips to Protect You and Your Company
 
10 things I’ve learnt about web application security
10 things I’ve learnt about web application security10 things I’ve learnt about web application security
10 things I’ve learnt about web application security
 

Similar a How to get recover from a hacked website

Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!
J_Cortes
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
Chelsea O'Brien
 

Similar a How to get recover from a hacked website (20)

WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKEDWORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
 
Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
 
3 Steps to Maintain & Cleanse your WordPress site
3 Steps to Maintain & Cleanse your WordPress site3 Steps to Maintain & Cleanse your WordPress site
3 Steps to Maintain & Cleanse your WordPress site
 
Prevent browser hijack infection
Prevent browser hijack infectionPrevent browser hijack infection
Prevent browser hijack infection
 
SSL and Wordpress
SSL and WordpressSSL and Wordpress
SSL and Wordpress
 
Creating Your own Section Website
Creating Your own Section WebsiteCreating Your own Section Website
Creating Your own Section Website
 
Effective Steps to Fix Joomla Hacking and Remove Malware
Effective Steps to Fix Joomla Hacking and Remove MalwareEffective Steps to Fix Joomla Hacking and Remove Malware
Effective Steps to Fix Joomla Hacking and Remove Malware
 
Reducing Server Resources: Improve Costs, SEO, Conversions & UX
Reducing Server Resources: Improve Costs, SEO, Conversions & UXReducing Server Resources: Improve Costs, SEO, Conversions & UX
Reducing Server Resources: Improve Costs, SEO, Conversions & UX
 
Care and feeding of your website
Care and feeding of your websiteCare and feeding of your website
Care and feeding of your website
 
How word press support and maintenance services helps your business
How word press support and maintenance services helps your businessHow word press support and maintenance services helps your business
How word press support and maintenance services helps your business
 
Malware Removal - Keep Your Website Safe from Malware.pdf
Malware Removal - Keep Your Website Safe from Malware.pdfMalware Removal - Keep Your Website Safe from Malware.pdf
Malware Removal - Keep Your Website Safe from Malware.pdf
 
Adware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and PreventionAdware and Browser Hijacker - Symptoms and Prevention
Adware and Browser Hijacker - Symptoms and Prevention
 
10 Ways to Speed Up and Secure your WP Site
10 Ways to Speed Up and Secure your WP Site10 Ways to Speed Up and Secure your WP Site
10 Ways to Speed Up and Secure your WP Site
 
My Site Was Hacked!
My Site Was Hacked!My Site Was Hacked!
My Site Was Hacked!
 
A Perfect Launch, Every Time
A Perfect Launch, Every TimeA Perfect Launch, Every Time
A Perfect Launch, Every Time
 
WPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press websiteWPSecurity best practices of securing a word press website
WPSecurity best practices of securing a word press website
 
Security Presentation for Boulder WordPress Meetup
Security Presentation for Boulder WordPress MeetupSecurity Presentation for Boulder WordPress Meetup
Security Presentation for Boulder WordPress Meetup
 
Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2Types of Security Threats WordPress Websites Face - Part 2
Types of Security Threats WordPress Websites Face - Part 2
 
Website Backup
Website Backup Website Backup
Website Backup
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

How to get recover from a hacked website

  • 1.
  • 2. WHAT TO DO WHEN YOUR WEBSITE IS HACKEDTHINGS YOU NEED TO KNOW & FOLLOW
  • 3. Your website is hacked, what will you do now? There are thousands of websites that get hacked, and the owners get it back in their original form.
  • 4. Apprise your Web Hosting company Very first need to know that your website is hacked is the hosting company of your site. In most cases, your web host will be able to fix this. In case if your host is not able to help you out, try to find out somebody who is specialized in retrieving hacked website.
  • 5. Quarantine the website The next most important step is to turn off your website and quarantine it offline till you are sure the problem is fixed.
  • 6. Analyze the attack? A hacker can attack your site in a number of ways: Check out how bad the attack was, this can be done by looking at the information in the Massage Center in the search console.
  • 7. Check for the File System This is for more in-depth investigation, to find out the maximum damage the hacker could have done to your website includes modifying the website and other file systems.
  • 8. Identify the vulnerability Now analyze your website for vulnerability, there may be more than one to be fixed. Fix all the errors. Keep searching for the odds, and ensure that the antivirus has scanned all the vulnerabilities.
  • 9. Maintain and clean your website Keep your website clean and updated. Secure it with the best security software like cWatch and never miss to perform the maintenance.
  • 10. Clean your server Clean the site’s content on the new backup file system, but make sure this is not on the server.
  • 11. Map your performance Make sure you do have a long-term maintenance plan and not paying attention will expose you to even more attacks in the future.
  • 12. Google Review When attacked for phishing, makes a review at google.com/safebrowsing/report_error/