SlideShare a Scribd company logo
1 of 17
Download to read offline
HACKED
Ten tips on
what to do next.
MY SITE WAS
!
You wake up one morning, get
your coffee, open your browser,
and navigate to your website.
To your horror, your discover that your website is
simply not there anymore. Or worse, it's been
replaced by a NSFW (not safe for work) page or a
crowd of ads for unsavory pharmaceutical
products.
To your horror, your discover that your website is simply
not there anymore. Or worse, it's been replaced by a NSFW
(not safe for work) page or a crowd of ads for unsavory
pharmaceutical products.
Even without reading the
solemn notification from your
browser, you know the grim
truth: you've been hacked.
Now you're in a panic.
How did this happen?
Where are your site
assets? Will you ever
get control back?
Oh No!
STEP 1
Calm down.
You can recover from this. You can contact a
professional service or fix it yourself.
Google even has an
that's ready to help you when you are ready.
8-step DIY recovery process
STEP 2
Let people know
you've been hacked.
Notify your host, webmaster, and, if you can,  your
customers. Now either clean up your local PC by
running anti-virus/anti-malware software, along with
your latest OS update, or, if you have doubts that
your machine is truly uninfected, commandeer a PC
that you're sure is clean.
STEP 3
Make sure.
Log into your hosting account to make sure you’ve
been hacked. Sometimes what you think is a hack is a
product of a service outage or maybe even a bad
plug-in that you might have installed. Your host will be
able to tell you if you were actually hacked and, if so,
begin to trace what caused it.
STEP 4
Backup (or back to
the drawing board).
In some cases, a good hosting company will have an
old backup of your site to serve as a starting point to
rebuild your site. You may also have backed up your
site locally. If your site is built with WordPress,
here is a guide for restoring your site from a backup.
STEP 5
Worst case scenario:
There is no back up. Data is corrupted beyond repair.
You need to rebuild.
There is one last refuge
you need to visit:
The Internet Archive
may have recorded your site
in its 456 billion page directory. 

STEP 6
Find your site snapshot.
Go to the last date your website was archived in a site
snapshot. It’s tedious, but you will at least see your old
data, and be able to copy and paste it into your new
site's pages.*
* I realize that this process is impractical with large database-driven sites, but for small sites
without hundreds of entries, it’s better than nothing, and can be a real life saver. 

STEP 8
Get a secure username
and password.
Many hackers use "brute force" attacks that look for
the easiest method to break into your site’s control
panel, often by using the username “admin” and
password “password.” If you've failed to change the
default settings that came with your hosting setup,
you're just inviting the hackers to get you.
Use http://passwordsgenerator.net/ to create names
and passwords that are harder to crack.

STEP 9
Don't wait for the next
catastrophe to strike.
Always back up your website
on a regular schedule.
WordPress site users have a vast library of backup tools
to choose from. For the rest of us, logging on via FTP
and whacking your content to your local PC is a task
that you need to mark on your calendar and stick to.
STEP 10
Check your users.
Delete any unwanted users
Delete users that are no longer
using your dashboard (guests)
Only give others the access they
need. For example, a guest
blogger on your site should
never be given admin status,
but give contributor status.
If this all seems to difficult, then by all means hire a
professional, or upgrade your hosting service to
include automatic backups, with managed security.
You may pay a premium for
this service, but it is totally
worth the peace of mind.
1. http://www.katalystcreativegroup.com/blog/140-5-critical-steps-if-your-
website-is-hacked.html
2. http://www.katalystcreativegroup.com/blog/137-how-can-i-protect-my-
site.html
3. http://www.elegantthemes.com/blog/tips-tricks/what-to-do-when-
your-wordpress-website-has-been-hacked
4. http://www.slideshare.net/michelebutcher/your-site-has-been-hacked-
now-what
SOURCES
A digital marketing leader since 1996, Didit provides
full-service online advertising and marketing services
with award-winning expertise and innovation.
Our full-service approach applies multi-faceted skill
sets, including SEO, PPC, CSEs, PLAs, Content
Marketing, and Social Media strategies that create a
holistic synergy of online marketing tools.

More Related Content

What's hot

WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017Otto Kekäläinen
 
Technical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 editionTechnical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 editionOtto Kekäläinen
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomAnonDownload
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomAnonDownload
 
Protect Thy Computer and Thyself
Protect Thy Computer and ThyselfProtect Thy Computer and Thyself
Protect Thy Computer and ThyselfiLinkoln Meetup
 
Testing and updating WordPress - Advanced techniques for avoiding regressions
Testing and updating WordPress - Advanced techniques for avoiding regressionsTesting and updating WordPress - Advanced techniques for avoiding regressions
Testing and updating WordPress - Advanced techniques for avoiding regressionsOtto Kekäläinen
 
The GiveCamp Guide to WordPress
The GiveCamp Guide to WordPressThe GiveCamp Guide to WordPress
The GiveCamp Guide to WordPressSarah Dutkiewicz
 
HTML5@电子商务.com
HTML5@电子商务.comHTML5@电子商务.com
HTML5@电子商务.comkaven yan
 
Share cash sucess! review 1, make money online from home
Share cash sucess! review 1,  make money online from homeShare cash sucess! review 1,  make money online from home
Share cash sucess! review 1, make money online from homeDuy Lên
 
Taking Web Applications Offline
Taking Web Applications OfflineTaking Web Applications Offline
Taking Web Applications OfflineMatt Casto
 
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017Otto Kekäläinen
 
Securing Your Joomla website
Securing Your Joomla websiteSecuring Your Joomla website
Securing Your Joomla websiteMike Carson
 
Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)Bastian Grimm
 
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 201340 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013Bastian Grimm
 
Wordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook FreeWordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook Freehuutienmmo
 
Become Master of Your Own Universe - DIBI 2013
Become Master of Your Own Universe - DIBI 2013Become Master of Your Own Universe - DIBI 2013
Become Master of Your Own Universe - DIBI 2013Phil Sturgeon
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012Angela Bowman
 
Word press security 101 2018
Word press security 101  2018 Word press security 101  2018
Word press security 101 2018 Laura Hartwig
 

What's hot (20)

WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017
 
Technical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 editionTechnical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 edition
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedom
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedom
 
Protect Thy Computer and Thyself
Protect Thy Computer and ThyselfProtect Thy Computer and Thyself
Protect Thy Computer and Thyself
 
Testing and updating WordPress - Advanced techniques for avoiding regressions
Testing and updating WordPress - Advanced techniques for avoiding regressionsTesting and updating WordPress - Advanced techniques for avoiding regressions
Testing and updating WordPress - Advanced techniques for avoiding regressions
 
Hit On The Internet
Hit On The InternetHit On The Internet
Hit On The Internet
 
The GiveCamp Guide to WordPress
The GiveCamp Guide to WordPressThe GiveCamp Guide to WordPress
The GiveCamp Guide to WordPress
 
HTML5@电子商务.com
HTML5@电子商务.comHTML5@电子商务.com
HTML5@电子商务.com
 
Share cash sucess! review 1, make money online from home
Share cash sucess! review 1,  make money online from homeShare cash sucess! review 1,  make money online from home
Share cash sucess! review 1, make money online from home
 
Taking Web Applications Offline
Taking Web Applications OfflineTaking Web Applications Offline
Taking Web Applications Offline
 
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
 
Securing Your Joomla website
Securing Your Joomla websiteSecuring Your Joomla website
Securing Your Joomla website
 
Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)
 
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 201340 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
 
Wordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook FreeWordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook Free
 
Become Master of Your Own Universe - DIBI 2013
Become Master of Your Own Universe - DIBI 2013Become Master of Your Own Universe - DIBI 2013
Become Master of Your Own Universe - DIBI 2013
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
 
Word press security 101 2018
Word press security 101  2018 Word press security 101  2018
Word press security 101 2018
 
Browsers
BrowsersBrowsers
Browsers
 

Viewers also liked

Finding things on the web with Yahoo! BOSS: IIT Delhi
Finding things on the web with Yahoo! BOSS: IIT DelhiFinding things on the web with Yahoo! BOSS: IIT Delhi
Finding things on the web with Yahoo! BOSS: IIT DelhiSaurabh Sahni
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008abhijitapatil
 
オープンソースによるドローン開発の概要( #ABC2015S )
オープンソースによるドローン開発の概要( #ABC2015S )オープンソースによるドローン開発の概要( #ABC2015S )
オープンソースによるドローン開発の概要( #ABC2015S )博宣 今村
 
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012Saurabh Sahni
 
Enabling Microservices @Orbitz - Velocity Conf 2015
Enabling Microservices @Orbitz - Velocity Conf 2015Enabling Microservices @Orbitz - Velocity Conf 2015
Enabling Microservices @Orbitz - Velocity Conf 2015Steve Hoffman
 
Dronekitによる python apiとアプリ開発の概要
Dronekitによる python apiとアプリ開発の概要Dronekitによる python apiとアプリ開発の概要
Dronekitによる python apiとアプリ開発の概要Masami Ogoshi
 
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...Saurabh Sahni
 
Hacking for Innovation - WPP, New York
Hacking for Innovation - WPP, New YorkHacking for Innovation - WPP, New York
Hacking for Innovation - WPP, New YorkSaurabh Sahni
 
The Cost of Bad (And Clean) Data
The Cost of Bad (And Clean) DataThe Cost of Bad (And Clean) Data
The Cost of Bad (And Clean) DataRingLead
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application DevelopersPrabath Siriwardena
 
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusConnected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusPrabath Siriwardena
 
REST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsREST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsJon Todd
 
ドローンの仕組み( #ABC2015S )
ドローンの仕組み( #ABC2015S )ドローンの仕組み( #ABC2015S )
ドローンの仕組み( #ABC2015S )博宣 今村
 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013tmd800
 
AppSec And Microservices
AppSec And MicroservicesAppSec And Microservices
AppSec And MicroservicesSam Newman
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & GuidelinesPrabath Siriwardena
 
AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016Sam Newman
 
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
Microservices Manchester:  Security, Microservces and Vault by Nicki WattMicroservices Manchester:  Security, Microservces and Vault by Nicki Watt
Microservices Manchester: Security, Microservces and Vault by Nicki WattOpenCredo
 

Viewers also liked (20)

Finding things on the web with Yahoo! BOSS: IIT Delhi
Finding things on the web with Yahoo! BOSS: IIT DelhiFinding things on the web with Yahoo! BOSS: IIT Delhi
Finding things on the web with Yahoo! BOSS: IIT Delhi
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
 
オープンソースによるドローン開発の概要( #ABC2015S )
オープンソースによるドローン開発の概要( #ABC2015S )オープンソースによるドローン開発の概要( #ABC2015S )
オープンソースによるドローン開発の概要( #ABC2015S )
 
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
 
Enabling Microservices @Orbitz - Velocity Conf 2015
Enabling Microservices @Orbitz - Velocity Conf 2015Enabling Microservices @Orbitz - Velocity Conf 2015
Enabling Microservices @Orbitz - Velocity Conf 2015
 
Dronekitによる python apiとアプリ開発の概要
Dronekitによる python apiとアプリ開発の概要Dronekitによる python apiとアプリ開発の概要
Dronekitによる python apiとアプリ開発の概要
 
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
 
Hacking for Innovation - WPP, New York
Hacking for Innovation - WPP, New YorkHacking for Innovation - WPP, New York
Hacking for Innovation - WPP, New York
 
The Cost of Bad (And Clean) Data
The Cost of Bad (And Clean) DataThe Cost of Bad (And Clean) Data
The Cost of Bad (And Clean) Data
 
The Worst Code
The Worst CodeThe Worst Code
The Worst Code
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application Developers
 
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusConnected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity Bus
 
REST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsREST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTs
 
ドローンの仕組み( #ABC2015S )
ドローンの仕組み( #ABC2015S )ドローンの仕組み( #ABC2015S )
ドローンの仕組み( #ABC2015S )
 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013
 
AppSec And Microservices
AppSec And MicroservicesAppSec And Microservices
AppSec And Microservices
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
 
Advanced API Security
Advanced API SecurityAdvanced API Security
Advanced API Security
 
AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016
 
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
Microservices Manchester:  Security, Microservces and Vault by Nicki WattMicroservices Manchester:  Security, Microservces and Vault by Nicki Watt
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
 

Similar to My Site Was Hacked!

Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!J_Cortes
 
15 Most Common WordPress Errors and Solution
15 Most Common WordPress Errors and Solution15 Most Common WordPress Errors and Solution
15 Most Common WordPress Errors and Solutionkethyjewel
 
WordPress Website Down.pdf
WordPress Website Down.pdfWordPress Website Down.pdf
WordPress Website Down.pdfHost It Smart
 
Responsible [digital] Home Ownership
Responsible [digital] Home OwnershipResponsible [digital] Home Ownership
Responsible [digital] Home OwnershipDenise (Dee) Teal
 
Software Support Done Right
Software Support Done RightSoftware Support Done Right
Software Support Done RightAndreas Zeitler
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressChelsea O'Brien
 
How to get recover from a hacked website
How to get recover from a hacked websiteHow to get recover from a hacked website
How to get recover from a hacked websitemounika k
 
WordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
WordPress Maintenance: 14 Essential Tasks to Keep Your Site OptimizedWordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
WordPress Maintenance: 14 Essential Tasks to Keep Your Site OptimizedMarshall Reyher
 
Troubleshooting WordPress
Troubleshooting WordPressTroubleshooting WordPress
Troubleshooting WordPressNile Flores
 
Debugging wordpress
Debugging wordpress Debugging wordpress
Debugging wordpress Steve Collins
 
Wordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've MadeWordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've MadeLaura Eagin
 
How to Increase Security on your Wordpress Website
How to Increase Security on your Wordpress WebsiteHow to Increase Security on your Wordpress Website
How to Increase Security on your Wordpress WebsiteMeganGood12
 
How I Learned to Stop Worrying and Love the Update Button
How I Learned to Stop Worrying and Love the Update ButtonHow I Learned to Stop Worrying and Love the Update Button
How I Learned to Stop Worrying and Love the Update Buttonchris-koerner
 
Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesArea41
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Rob Fuller
 

Similar to My Site Was Hacked! (20)

Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!
 
15 Most Common WordPress Errors and Solution
15 Most Common WordPress Errors and Solution15 Most Common WordPress Errors and Solution
15 Most Common WordPress Errors and Solution
 
WordPress Website Down.pdf
WordPress Website Down.pdfWordPress Website Down.pdf
WordPress Website Down.pdf
 
Responsible [digital] Home Ownership
Responsible [digital] Home OwnershipResponsible [digital] Home Ownership
Responsible [digital] Home Ownership
 
Software Support Done Right
Software Support Done RightSoftware Support Done Right
Software Support Done Right
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
 
How to get recover from a hacked website
How to get recover from a hacked websiteHow to get recover from a hacked website
How to get recover from a hacked website
 
WordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
WordPress Maintenance: 14 Essential Tasks to Keep Your Site OptimizedWordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
WordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
 
Zero To WordPress Plubish
Zero To WordPress PlubishZero To WordPress Plubish
Zero To WordPress Plubish
 
Troubleshooting WordPress
Troubleshooting WordPressTroubleshooting WordPress
Troubleshooting WordPress
 
Setup and run wordpress: 201
Setup and run wordpress: 201Setup and run wordpress: 201
Setup and run wordpress: 201
 
Debugging wordpress
Debugging wordpress Debugging wordpress
Debugging wordpress
 
Wordpress Guide
Wordpress GuideWordpress Guide
Wordpress Guide
 
Presentation1
Presentation1Presentation1
Presentation1
 
Wordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've MadeWordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've Made
 
How to Increase Security on your Wordpress Website
How to Increase Security on your Wordpress WebsiteHow to Increase Security on your Wordpress Website
How to Increase Security on your Wordpress Website
 
Pimp my Plone
Pimp my PlonePimp my Plone
Pimp my Plone
 
How I Learned to Stop Worrying and Love the Update Button
How I Learned to Stop Worrying and Love the Update ButtonHow I Learned to Stop Worrying and Love the Update Button
How I Learned to Stop Worrying and Love the Update Button
 
Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost Stories
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
 

More from Didit Marketing

What makes SEO good or bad?
What makes SEO good or bad?What makes SEO good or bad?
What makes SEO good or bad?Didit Marketing
 
The Art of the 404 Error Page
The Art of the 404 Error PageThe Art of the 404 Error Page
The Art of the 404 Error PageDidit Marketing
 
INFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The BadINFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The BadDidit Marketing
 
Let's Throw A Twitter Party!
Let's Throw A Twitter Party!Let's Throw A Twitter Party!
Let's Throw A Twitter Party!Didit Marketing
 
Kevin Lee- The New Online Marketing
Kevin Lee- The New Online MarketingKevin Lee- The New Online Marketing
Kevin Lee- The New Online MarketingDidit Marketing
 
10 Quotes from LinkedIn Experts
10 Quotes from LinkedIn Experts10 Quotes from LinkedIn Experts
10 Quotes from LinkedIn ExpertsDidit Marketing
 
Are You Feeding the Hummingbird?
Are You Feeding the Hummingbird? Are You Feeding the Hummingbird?
Are You Feeding the Hummingbird? Didit Marketing
 
Maximizing Social Advertising
Maximizing Social AdvertisingMaximizing Social Advertising
Maximizing Social AdvertisingDidit Marketing
 

More from Didit Marketing (9)

What makes SEO good or bad?
What makes SEO good or bad?What makes SEO good or bad?
What makes SEO good or bad?
 
Developing Buyer Personas
Developing Buyer PersonasDeveloping Buyer Personas
Developing Buyer Personas
 
The Art of the 404 Error Page
The Art of the 404 Error PageThe Art of the 404 Error Page
The Art of the 404 Error Page
 
INFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The BadINFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The Bad
 
Let's Throw A Twitter Party!
Let's Throw A Twitter Party!Let's Throw A Twitter Party!
Let's Throw A Twitter Party!
 
Kevin Lee- The New Online Marketing
Kevin Lee- The New Online MarketingKevin Lee- The New Online Marketing
Kevin Lee- The New Online Marketing
 
10 Quotes from LinkedIn Experts
10 Quotes from LinkedIn Experts10 Quotes from LinkedIn Experts
10 Quotes from LinkedIn Experts
 
Are You Feeding the Hummingbird?
Are You Feeding the Hummingbird? Are You Feeding the Hummingbird?
Are You Feeding the Hummingbird?
 
Maximizing Social Advertising
Maximizing Social AdvertisingMaximizing Social Advertising
Maximizing Social Advertising
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

My Site Was Hacked!

  • 1. HACKED Ten tips on what to do next. MY SITE WAS !
  • 2. You wake up one morning, get your coffee, open your browser, and navigate to your website.
  • 3. To your horror, your discover that your website is simply not there anymore. Or worse, it's been replaced by a NSFW (not safe for work) page or a crowd of ads for unsavory pharmaceutical products. To your horror, your discover that your website is simply not there anymore. Or worse, it's been replaced by a NSFW (not safe for work) page or a crowd of ads for unsavory pharmaceutical products.
  • 4. Even without reading the solemn notification from your browser, you know the grim truth: you've been hacked. Now you're in a panic. How did this happen? Where are your site assets? Will you ever get control back? Oh No!
  • 5. STEP 1 Calm down. You can recover from this. You can contact a professional service or fix it yourself. Google even has an that's ready to help you when you are ready. 8-step DIY recovery process
  • 6. STEP 2 Let people know you've been hacked. Notify your host, webmaster, and, if you can,  your customers. Now either clean up your local PC by running anti-virus/anti-malware software, along with your latest OS update, or, if you have doubts that your machine is truly uninfected, commandeer a PC that you're sure is clean.
  • 7. STEP 3 Make sure. Log into your hosting account to make sure you’ve been hacked. Sometimes what you think is a hack is a product of a service outage or maybe even a bad plug-in that you might have installed. Your host will be able to tell you if you were actually hacked and, if so, begin to trace what caused it.
  • 8. STEP 4 Backup (or back to the drawing board). In some cases, a good hosting company will have an old backup of your site to serve as a starting point to rebuild your site. You may also have backed up your site locally. If your site is built with WordPress, here is a guide for restoring your site from a backup.
  • 9. STEP 5 Worst case scenario: There is no back up. Data is corrupted beyond repair. You need to rebuild. There is one last refuge you need to visit: The Internet Archive may have recorded your site in its 456 billion page directory. 

  • 10. STEP 6 Find your site snapshot. Go to the last date your website was archived in a site snapshot. It’s tedious, but you will at least see your old data, and be able to copy and paste it into your new site's pages.* * I realize that this process is impractical with large database-driven sites, but for small sites without hundreds of entries, it’s better than nothing, and can be a real life saver. 

  • 11. STEP 8 Get a secure username and password. Many hackers use "brute force" attacks that look for the easiest method to break into your site’s control panel, often by using the username “admin” and password “password.” If you've failed to change the default settings that came with your hosting setup, you're just inviting the hackers to get you. Use http://passwordsgenerator.net/ to create names and passwords that are harder to crack.

  • 12. STEP 9 Don't wait for the next catastrophe to strike.
  • 13. Always back up your website on a regular schedule. WordPress site users have a vast library of backup tools to choose from. For the rest of us, logging on via FTP and whacking your content to your local PC is a task that you need to mark on your calendar and stick to.
  • 14. STEP 10 Check your users. Delete any unwanted users Delete users that are no longer using your dashboard (guests) Only give others the access they need. For example, a guest blogger on your site should never be given admin status, but give contributor status.
  • 15. If this all seems to difficult, then by all means hire a professional, or upgrade your hosting service to include automatic backups, with managed security. You may pay a premium for this service, but it is totally worth the peace of mind.
  • 16. 1. http://www.katalystcreativegroup.com/blog/140-5-critical-steps-if-your- website-is-hacked.html 2. http://www.katalystcreativegroup.com/blog/137-how-can-i-protect-my- site.html 3. http://www.elegantthemes.com/blog/tips-tricks/what-to-do-when- your-wordpress-website-has-been-hacked 4. http://www.slideshare.net/michelebutcher/your-site-has-been-hacked- now-what SOURCES
  • 17. A digital marketing leader since 1996, Didit provides full-service online advertising and marketing services with award-winning expertise and innovation. Our full-service approach applies multi-faceted skill sets, including SEO, PPC, CSEs, PLAs, Content Marketing, and Social Media strategies that create a holistic synergy of online marketing tools.