Sign in Registration
ruen

Checking and treating the site from viruses

Sometimes a situation may arise when the site starts to work differently than before, some oddities in its work become noticeable. This could be a sign of a virus infection of the site. In this case, you must immediately check the site for viruses and start curing in case of infection.

Вирусы на сайте

What are the consequences of hacking? Variety. For example, the site will be closed and malicious code will be placed, which will already infect the computers of visitors and extort money. Or all data will be stolen and transferred to your competitors. There are many options for the development of events, so it is necessary to quickly stop hacking.

It is important to understand that if other sites are located near the site, hacking could be done through them, or vice versa, they can also be hacked through the current site. Therefore, all verification and treatment steps must be performed for all sites on the same hosting account.

How to scan a site for viruses ? There are many verification services on the Internet, and hosting services offer special services. But as a recent case has shown, they may not always detect an infection. In this case, you should contact a specialist. A qualified specialist will be able to quickly check the site and cure it.

What should you pay attention to? First of all, you need to browse the main directories of the site through ftp . If unfamiliar extraneous files and folders appear, this is a sign of infection . In the administrative part of the site, you need to check the basic settings to see if something superfluous has appeared there, for example, new roles and users. It is important to look at the contents, their modified dates. If unauthorized access to the site is detected, it is necessary to immediately start repelling attacks in real time.

Perhaps, at the moment of detection of outside interference, the attacker performs the initial stage of hacking, after which the site will be completely taken out of work. Therefore, it is imperative to start monitoring and mitigating attacks immediately.

You can put the site into maintenance mode and start online recovery of the site from a backup copy, having previously made a backup of the current state so that you can further study the site's vulnerabilities and the hacking techniques used. You also need to start adding ip-addresses from which the hacking takes place in the blacklist, or rather address ranges, since often the addresses change dynamically.

There is such a problem when even the restored site is still infected, since the infection occurred a long time ago. This can happen if you do not make backups yourself, and the hosting may have a short storage period for backups. In this case, you will have to manually delete malicious folders and files, as well as check all system files for intrusion of foreign code. You will also have to analyze the database and the administrative part of the site for malicious code.

But even if everything is successfully repaired, if the vulnerability was not found and fixed, hacking will be repeated . Therefore, it is important to restore all these sites and immediately eliminate the vulnerability, it is better to do it all on a local PC, and then transfer it to hosting. This will protect against new hacks while the vulnerability is fixed. For example, you may need to update the system (CMS) on which the site or its modules and themes are running.

After completing the above steps, you can restore the site to work. If you are unable to get rid of viruses on the site, you can ask for help through the feedback on this site.

Comments (0)
For commenting sign in or register.

Latest articles

Popular sections

Eqsash (Tools)

Android app - VK LAST USER ID, отучитель от зависимости и т.д.:
Available on Google Play

Amessage (Communication)

Login to the web version
Android app:
Available on Google Play

Share this

Subscribe to

YouTube

Books

IT notes - In simple language about the most necessary things (HTML, CSS, JavaScript, PHP, databases, Drupal, Bitrix, SEO, domains, security and more), PDF, 500 p.