{"id":22151,"date":"2024-03-05T11:46:22","date_gmt":"2024-03-05T09:46:22","guid":{"rendered":"https:\/\/wpbeveiligen.nl\/?p=22151"},"modified":"2023-08-02T11:48:36","modified_gmt":"2023-08-02T09:48:36","slug":"hacked-website-heres-how-to-fix-it","status":"publish","type":"post","link":"https:\/\/wpbeveiligen.nl\/en\/hacked-website-heres-how-to-fix-it\/","title":{"rendered":"Hacked website? Here’s how to fix it!"},"content":{"rendered":"

When you have a hacked website, you naturally want to restore it to a good state as quickly as possible<\/a>. For businesses, the costs of a defective website can quickly add up, but even as a blog owner, you wouldn’t want your reputation on Google to be affected! A hacked website results in Google ranking you lower, provided that it is not restored within a reasonable time. This is to protect visitors and because Google only displays good sites in its search results.<\/p>\n

Several ways to restore the hacked website<\/h2>\n

There are many ways to achieve the same goal, and this applies to restoring your hacked website. We will describe some ways to restore your hacked website:<\/p>\n

But first: make a complete backup of your hacked website and don’t forget to save the database!<\/p><\/blockquote>\n

1. A relatively easy way to temporarily restore the hacked website<\/h2>\n

You can ask many hosting providers to restore a backup<\/strong> from before the website was hacked. You must specify the date and time, for example, from 7 or more days ago. (This may incur costs) Therefore, it may be better if you have the ability to create and restore backups yourself.
\nBe aware that you may lose recent updates or pages.<\/em><\/p>\n

After the restoration, quickly secure your website to prevent immediate re-hacking!<\/strong><\/p>\n

After restoring the backup, you may have a website that is free from the hacks and modifications caused by the hacker\/hack script. However, as you can imagine, this is temporary, and the website is often hacked by automated scripts 9\/10 times, and they may visit your website again. Therefore, secure your website so that it does not encounter problems again.<\/p>\n

2. If you can program, you can correct the modified files<\/h2>\n

As a programmer, you can locate and modify or remove the altered code (hacks)<\/strong>. Please note that this is not easy, as hackers or scripts often make many hacks, backdoors, and modifications once they have entered your website.<\/p>\n

A tip: to find the hacked files, you can use an FTP program like Filezilla<\/a> and check the modification date of the files<\/strong>. The date of the hacked files often stands out as the only one different from all the other dates.<\/p>\n

After the restoration, quickly secure your website to prevent immediate re-hacking! A clean website is not a secure website, as you may have already experienced.<\/p>\n

3. Have your hacked website professionally restored<\/h2>\n

WPbeveiligen uses the knowledge and experience built since 2007 as a web host and programmer to restore your website to its correct state as quickly as possible. We can also create backups of files and restore the website with minimal data loss.<\/p>\n

Click here<\/a> to have WPbeveiligen restore your hacked website (and secure it immediately)<\/p>\n

If you let WPbeveiligen restore your website, you can be sure that the hacked files are gone. We work thoroughly following a proven pattern that has been tested for years. We also perform post-checks and provide standard guarantees.<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

When you have a hacked website, you naturally want to restore it to a good state as quickly as possible. For businesses, the costs of a defective website can quickly add up, but even as a blog owner, you wouldn’t want your reputation on Google to be affected! A hacked website results in Google ranking […]<\/p>\n","protected":false},"author":4,"featured_media":7136,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[198],"tags":[],"_links":{"self":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts\/22151"}],"collection":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/comments?post=22151"}],"version-history":[{"count":1,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts\/22151\/revisions"}],"predecessor-version":[{"id":23466,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts\/22151\/revisions\/23466"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/media\/7136"}],"wp:attachment":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/media?parent=22151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/categories?post=22151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/tags?post=22151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}