What if my site has been hacked ?

You detect abnormal activity on your server, a modification of your files, system slowdown ... After verification, you are sure, you are attacked.

Here are some rules you have to recover quickly apply your site, reduce losses of data and the risks of your site hacked again.



The first rule: be quick!

An attack is often a matter of seconds or minutes. The goal of the hacker is to get his way as quickly as possible.

Try to get the IP address of the hacker

Make a "tracert" to find the most accurate location possible hacker.
Tracert (under Windows) or traceroute (Linux) is a network diagnostic tool found on most operating systems, to determine the path a packet.

On UNIX / Linux systems, the traceroute command is:

traceroute name.of.the.machine

On Windows systems, the traceroute command is:

tracert name.of.the.machine

Put your site offline

Consider putting your site offline immediately to prevent infecting your visitors and identify the origin of hacking

Change all your passwords.

Change the password for your FTP access for a stronger password. You also need to scan and clean your PC ugly antivirus to prevent your site is attacked again.

Reinstall a clean copy of your site

After hacking your website, the hacker must surely install a backdoor into your server. That is why it is mandatory to delete any files on FTP and reinstall a clean copy of your site.

How to reduce the chances that your site hacked?

Stay up to date with the latest updates

If you install an application for your site, using the latest existing version. This includes applications from third and CMS (Content Management System) like Joomla or WordPress. Verify the information provide playing away and taking in terms of safety.

Check your site for common vulnerabilities.

Avoid having directories with open permissions. Also check out the XSS vulnerability (cross-site scripting), Upload, RFI, and SQL injection.

Keep an eye on your log files

The log is the log of a server. It lists all the queries delivered by the server to clients. You might be surprised by what you find.

Use secure protocols

SSH and SFTP must be used for data transfer, rather than plain text protocols such as Telnet or FTP. SSH and SFTP use encryption and are much safer.

Remember that the best support for this blog is to like and share our articles!
Previous
Next Post »