Are You Ready to Get Hacked?

In the security world, the following advice seems to be gold: keep templates and plugins up to date; use secure passwords and captchas; be careful whom you give access and to what; use a security-conscious web host.

While those are all great tips and we encourage them, your website is still (and always will be) hackable. We’ve seen and helped clients with numerous hacks over the years, so we wanted to share some advice that goes beyond following security best practices.

As your user base and reputation grow, getting hacked becomes more likely and it really can happen to anyone. Therefore, the best thing you can do is to have a hack recovery plan. In case of disaster, you’ll know exactly what needs to be done, and who can do it for you. You won’t panic and make hasty decisions that may turn a crisis into a catastrophe.

1. Be the First to Know

You don’t want to find out about a hack from a random visit to your own site. You don’t want to see the red screen of death, with an unwelcoming message like “Danger: malware ahead!” or “This website may harm your computer”. You don’t want to see your homepage defaced (at the time of writing, a WordPress REST API Vulnerability is at large and defacing thousands of websites).

The worst thing about finding a hack by accident is that you probably won’t know how long it’s been there. You won’t be able to put the damage into perspective.

The solution is to set up one or several proactive tools that detect hacks and notify you.

Front-end/Source Code Monitors
There are tools that monitor the front-end of your site for uptime and content changes, such as Pingdom. There are also tools that monitor the source code of your website for hacks, such as our own HackAlert service. Both can be set up to send various notifications and the options here are endless.

Google Search Console Alerts
Although you cannot count on it for an early warning, Google’s Search Console detects a plethora of hacks. Set up your site and make sure to enable email alerts in the preferences. It’s a good idea to keep an eye on Google’s security status regarding your site. Best of all, it’s free.

2. Make a Backup

You will need a backup copy of the hacked site to be used later when removing malicious code. Make a backup and save it before going into maintenance mode.

That being said, make sure your site is backed up regularly and several copies are kept at all times. A clean copy can also be of help when later recovering your site. Your web host will usually make backups for you, but there are plenty of tools and plugins to set up backups yourself.

3. Get the Access Logs

Another thing to be used in the recovery of your site is access logs. Talk to your host whether they can provide them and how far back in time. Some attacks are difficult to find and may require logs from 6 months ago. If your host cannot provide that, set up log keeping yourself. At SiteGround, and probably other hosts, access logs can be downloaded from the Statistics tool.

4. Have Maintenance Mode Ready

Going into maintenance mode as soon as possible is important. Search engines constantly check the HTTP status of your site and what content it is serving to visitors. Having your site down or serving malicious content will obviously damage your rankings.

This is why it’s a good idea to have a simple HTML maintenance page ready before you ever get hacked. You’ll be able to enable it quickly, while your site is being cleaned, minimizing damage in the eyes of both visitors and search engines.

The best way to enable maintenance mode is by using .htaccess to redirect all requests to an html page. This way, any malicious files left on your domain will become inaccessible and will forward to the said page.

5. Clean the Website and Vulnerability

To clean your website, you can either restore from a clean backup or remove the malicious code from files and databases. Whatever the method of cleaning, you will have to make sure the vulnerability is eliminated afterward.

Restoring a Clean Backup
This is the fastest, easiest and cheapest option that most people will be able to perform on their own with their backup tool. However, it comes with some disadvantages. If you are running a website that is updated frequently, you may lose some data (e.g. an online store might lose some orders). Also, you can never be sure that the backup you are restoring is completely clean.

Remove the Malicious Code From Files and Database
This is the more effective option, but it can prove extremely difficult depending on the hack. If you are not completely sure what you are doing, it’s best to use a 3rd party cleaning service. Identifying and removing attacks is well beyond this blog post.

Eliminate the Vulnerability
This is where the access logs come into play, however, once again this can become a difficult task that you should be confident with when performing it on your own. At the end of the day, you need to know the malicious code was removed from your files and database, together with the vulnerability used to access and modify those files and databases.

SiteGround customers can order a thorough hack repair from our partner Sucuri, by going to Client Area -> Support -> Advanced Technical Help -> Website Security.

6. Return to Live

At the end of the process, you should change all passwords of all users, tools, and devices that have access to your site (control panel, FTP, SSH, etc.). Make sure the same is done by all website collaborators. Do this before you go live.

Another thing you should consider at this point is your website users and visitors. Analyze the situation and find out if any of their data was exploited during the attack. If yes, it’s a good idea to communicate it, along with a password change and any other needed actions to users.

Access email sent!

Sign Up For
More Awesome Content!

Subscribe to receive our monthly newsletters with the latest helpful content and offers from SiteGround.

Thanks!

Please check your email to confirm your subscription.

author avatar

Hristo Pandjarov

WordPress Innovations Director

Enthusiastic about all Open Source applications you can think of, but mostly about WordPress. Add a pinch of love for web design, new technologies, search engine optimisation and you are pretty much there!

Comments ( 8 )

author avatar

Jack Regehr

Feb 10, 2017

Is there a way in WordPress for a website manager to black list all but his IP for admin access?

Reply
author avatar

Hristo Pandjarov Siteground Team

Feb 11, 2017

Yes, simply create an .htaccess file in the wp-admin folder with the following lines in it: deny from all allow from 8.8.8.8 where 8.8.8.8 is your IP address :)

Reply
author avatar

Benjamin Weiler

Feb 12, 2017

Hey, I'm using Clef security plugin and I disabled login form. Is this plugin is safe?

Reply
author avatar

Hristo Pandjarov Siteground Team

Feb 13, 2017

Yes, Clef is a reputable solution used by thousands of our customers. However, note that it takes care only of part of your overall security and it's still necessary to follow good practices.

Reply
author avatar

marke

Feb 13, 2017

The use of a wordpress firewall plugin would be my first line of defense.

Reply
author avatar

Ken

Feb 15, 2017

What if I won't install any security plugins on my WP site, will Siteground's WAF enough to block most attacks (SQL injection, XSS, etc) ?

Reply
author avatar

Hristo Pandjarov Siteground Team

Feb 16, 2017

Having a good security on your website requires an overall effort rather than a single action. Our WAF will stop a lot of attacks towards WordPress sites but it caanot protect you against every possible exploit attempt. Having a well-configured app, strong passwords, well maintained WAF, secure local networks are amongst the most important things to look after when you think security.

Reply
author avatar

stephon

Dec 21, 2017

I appreciate this article so much, thanks for sharing!

Reply

Start discussion

Related Posts