{"id":7311,"date":"2016-03-29T08:19:45","date_gmt":"2016-03-29T00:19:45","guid":{"rendered":"http:\/\/exabytes.sg\/blog\/?p=7311"},"modified":"2022-01-28T17:50:33","modified_gmt":"2022-01-28T09:50:33","slug":"how-to-know-what-to-do-when-your-website-is-hacked","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/how-to-know-what-to-do-when-your-website-is-hacked\/","title":{"rendered":"Learn How To Know &#038; What To Do When Your Website is Hacked"},"content":{"rendered":"<p>We all work really hard to get good ranking on Google search engine. Nevertheless, things might\u00a0go wrong &#8212;\u00a0your website could still\u00a0get hacked.<\/p>\n<p>More often than not, we see Google label these hacked site with a &#8220;malware warning&#8221; on its search results.<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"aligncenter wp-image-7312 size-medium\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/03\/2014_11_17_02_21_161.png?resize=300%2C181&#038;ssl=1\" alt=\"malware hacked\" width=\"300\" height=\"181\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/03\/2014_11_17_02_21_161.png?resize=300%2C181&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/03\/2014_11_17_02_21_161.png?w=693&amp;ssl=1 693w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>So what can you do when you see the dreaded \u201cThis site may harm your computer\u201d label for <em><strong>your website?<\/strong><\/em><\/p>\n<p><em>*Please note that this error message only appear from Mozilla Firefox and\u00a0Google Chrome, and will not appear on other web browsers.<\/em><\/p>\n<p>But there is still <em><strong>&#8216;good&#8217; news\u00a0<\/strong><\/em>\u2013 these\u00a0website\u00a0are still within the Google index and haven&#8217;t been completely removed.<\/p>\n<h2><strong>How To Know When Your Website is Hacked<\/strong><\/h2>\n<p>This is what Google does when it thinks a site has been infected by malware or hacked:<\/p>\n<ul>\n<li>Put a hacked flag on the suspected site in their ranking database<\/li>\n<li>Remove the site from ranking competitively by suppressing it in keyword searches<\/li>\n<li>Contacts the site owner<\/li>\n<li>Sends out a malware warning through the website\u2019s (verified) Google Webmaster Tools account<\/li>\n<\/ul>\n<p>However, many website owners\u00a0find out that Google doesn\u2019t perform all these tasks all the time, and<em> site owners often don\u2019t realize what is happening until their website has been labeled with a malware warning, or has gone missing from the Google index.<\/em><\/p>\n<h2><strong>What To Do When Malware Warning Happened<\/strong><\/h2>\n<p>Try these steps to fix your website:<\/p>\n<ul>\n<li>Register and verify your site in Google\u2019s <a href=\"https:\/\/www.google.com\/webmasters\/tools\/home?pli=1\" rel=\"noopener\">Search Console<\/a>.<\/li>\n<li>Sign in to Search Console and check the &#8220;Security Issues&#8221; section to see details of sample URLs that might be hacked. Fix the security issue that allowed your website to be infected. Otherwise, your site is likely to be reinfected.<\/li>\n<li>Read<a href=\"https:\/\/www.google.com\/webmasters\/hacked\/\" rel=\"noopener\"> Google\u00a0resources<\/a> for hacked sites for detailed information on how to fix your website.<\/li>\n<li>Request a review in the Security Issues section in Search Console when your entire website is clean and secure. After Google\u00a0check that your site is fixed, they&#8217;ll remove the &#8220;This site may be hacked&#8221; message.<\/li>\n<\/ul>\n<p>Next, it\u2019s time for a <a href=\"https:\/\/www.google.com\/webmasters\/tools\/home?hl=en\" rel=\"noopener\">Google Review<\/a>.\u00a0Please note that it may take up to three weeks. You&#8217;ll be notified once Google receives your request.<\/p>\n<p>So there you go. Take action to check from time to time and ensure your website is malware-free and still searchable.<\/p>\n<p>Cheers! Read more about <a href=\"https:\/\/www.exabytes.sg\/blog\/wordpress-website-security-tips\/\" target=\"_blank\" rel=\"noopener\">WordPress Website Security Tips in 2021<\/a> to avoid from hacked<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all work really hard to get good ranking on Google search engine. Nevertheless, things might\u00a0go wrong &#8212;\u00a0your website could still\u00a0get hacked. More often than not, we see Google label these hacked site with a &#8220;malware warning&#8221; on its search results. So what can you do when you see the dreaded \u201cThis site may harm [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7312,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[262,293,7],"tags":[123,125,147],"class_list":{"0":"post-7311","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-all-about-exabytes","8":"category-security-backup","9":"category-sharing-tips-for-success","10":"tag-google","11":"tag-hacked","12":"tag-malware"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/03\/2014_11_17_02_21_161.png?fit=693%2C417&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-1TV","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/7311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=7311"}],"version-history":[{"count":3,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/7311\/revisions"}],"predecessor-version":[{"id":22099,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/7311\/revisions\/22099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/7312"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=7311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=7311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=7311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}