If your website has been hacked recently, you will have to put a little time in to remove the attack and to prevent your site from getting hacked again. Below you will find some recommended steps to help you recover from a hacked website.
Recovering from an attack
1. Contact your hosting provider
Your hosting provider should be able to give you some details about the hack, including how the site was hacked in the first place. If your site is on shared hosting, for example, it may mean that other domains on the server have been compromised as well.
2. Remove the malware or other content that has been injected in to your site
Your hosting provider should have tools to help you remove the content that was placed on your site by the hacker. If your hosting provider does not offer this to you, you may want to consider using StopTheHacker to scan your site so it can remove the content. StopTheHacker will also help by regularly scanning your site for malware to help mitigate the future probability of your site being hacked.
3. Check to see if your site is on any blacklists. A blacklist can temporarily impact your site’s SEO and SERPs, so you should login and see if you have any site warnings in Google Webmaster Tools that need to be addressed. You will have to resubmit your site for review once the hack has been resolved.
Preventing and mitigating the risks of a future hack
If you want to lock down your site to reduce the probability of being attacked again, please take the following steps:
1. Make sure you always update your content management system to the latest version. If you’re using WordPress, for example, check to make sure that you’re on the most recent version of WordPress. CMS platforms push out updates to address known vulnerabilities, so you should always upgrade to the latest version when it is made available to you.
2. Make sure your plugins are up to date. If you’re using plugins or extensions on your site, which many CMS platforms do, these are also potentially vulnerable if you are not working on the most recent version of the plugin.
3. Activate CloudFlare’s Web Application Firewall (WAF). Customers on a paid CloudFlare plan can activate the Web Application Firewall that will will challenge or block known problematic behavior online, and you can activate it within a matter of moments on your site.
4. Lock down your admin back end. Many hacks are due to brute force attacks on sites, and you can look at services like Clef or Brute Protect to help lock your site down from attacks designed to target CMS platforms like WordPress.
5. Look at backing up your site. In the event of your site getting hacked, you also don’t want to have any issues with losing valid content that was there prior to the hack. You can look at using a service like CodeGuard to help you get your site back up and running normally by restoring it from a backup.