Common Ways Websites Get Hacked & What To Do Next

Usually, websites are hacked or injected with malicious code in 3 ways:
a) Weak Username & Password
– Hackers repeatedly attempt to guess the cPanel or WP-Admin login credentials (smart-guessing). If your username/password is weak (too easy to guess), they will eventually succeed in logging in.
b) Malicious Plugins, Themes, or Ads
– Hackers develop infected plugins, themes, widgets, or ads that contain malware. If you install these on your website, they can steal your cPanel username & password.
( You can refer to this case here: http://forums.cpanel.net/f5/iframe-attack-problem-141433.html )
c) Malware on Your PC/Laptop/Phone
– You may have accidentally downloaded malware while browsing external websites. This malware could already be embedded in your PC, laptop, or mobile phone.
If you donโt remove it using updated Anti-Virus, Anti-Spyware, or Anti-Malware software, hackers will still be able to steal the new password, even if you change your cPanel password multiple times.
If You Donโt Address These 3 Factors, the Issue May Recur.
For more information, refer here:
๐ https://www.wordfence.com/blog/2016/03/attackers-gain-access-wordpress-sites
๐ https://www.sitepoint.com/preventing-brute-force-attacks-against-wordpress-websites/
๐ http://www.google.com/support/webmasters/bin/answer.py?answer=163633
How to Fix It:
1) Step 1: Restore Your Website
- Try to make your website go ‘live’ again by replacing corrupted files (infected by malware).
- Download fresh WordPress system files from https://wordpress.org/download โ Unzip the files โ Upload them back to your hosting account, replacing (overwrite) the old system files that was corrupted.
- ย Once all files are uploaded, your website should be back online.
- If you’re not familiar with this process, we offer this service for only RM50.
2) Step 2: Request Google to Review Your Website
- After your website is back online, submit a “Request a Review” to Google: https://developers.google.com/web/fundamentals/security/hacked/request_review
- Google will scan your website and identify any malicious links or codes (if there are any malwares hiding in your theme, plugin, or widget).
- You must sign up/log in to your Google account and enter your website URL there.
3) Step 3: Identify and Remove Infected Plugins/Themes
- Once Google identifies the loopholes, make sure to avoid reinstalling those infected plugins/themes in the future, as they contain malware.
4) Step 4: Scan Your PC/Laptop for Malware
- Scan your devices (PC, laptop, or mobile phone) for malware.
- As long as malware is present, hackers will keep stealing your hosting/WP-Admin username & password, even if you change them multiple times.
Follow All the Steps Above! โ
NOTE:
๐ก If you prefer professional assistance for Steps 2, 3, and 4, you can hire malware removal experts, such as:
๐น Sucuri Security Services: https://sucuri.net/
๐น Freelance Experts on Upwork: https://www.upwork.com/hire/wordpress-malware-removal-freelancers/
๐น Feel free to survey and choose the best service for your needs.