PREV
NEXT
  • WordPress hacked?

    Steps for dealing with a hacked WordPress website

Help for a hacked WordPress website

Find malicious code & remove malware
...or have it reliably removed.

Around 43% of all websites on the internet run on WordPress. Among content management systems, that equals an impressive market share of 61% (as of 2026).
Die massive Verbreitung und Beliebtheit von WordPress macht das System zu einem attraktiven Angriffsziel für Hacker. In den allermeisten Fällen finden Angriffe völlig automatisiert statt. Ziel sind nicht einzelne Unternehmen oder Personen, sondern bekannte Schwachstellen im Core und in den Plugins. Die Hauptursache für gehackte Webseiten sind also versäumte Sicherheitsupdates. Gleiches gilt auch für Joomla! as well as all other CMS and e-commerce systems.

In case your WordPress has been hacked, you will find a summary of the most important recovery steps here, along with a few tips.


Schritt 1: Website deaktivieren - Backups herunterladen

To prevent further damage, the website should first be taken offline.
Two proven options:

Im Anschluss laden Sie Sicherungen von allen relevanten Daten herunter. Neben des Dateisystems und der Datenbank gehören auch die Logdateien des Servers für die unbedingt notwendige Analyse des Hackerangriffs dazu. Diese befinden sich entweder im /logs Verzeichnis auf dem Webspace oder sind über das Control Panel des Webhosters abrufbar.

Step 2: Analyze the breach - find the security vulnerability

For malware analysis, it is important that the timestamps of the downloaded files are preserved (option in the FTP program). To prevent a virus alert from interrupting the transfer, temporarily disable the local antivirus protection.

You can identify potential malicious files as follows:

  • Inspect recently modified files
  • Review the hoster's malware logs
  • Run a local scan of the data with good antivirus software
  • Check the WordPress root directory
    • Watch out for file names != .htaccess, index.php, wp-*.php, xmlrpc.php (By default, there are 15 PHP files in the WP root directory

Note the timestamp (file modification time) for each malicious code finding.
Attention! This may also have been falsified - matching the other files in the respective directory so as not to stand out. The timestamps of the directories should also be taken into account.
Based on that:

  • Analyze the web server access logs
    • Suspicious POST entries
    • Typical attack patterns

A helpful tool for picking out POST requests and more evaluation tips can be found here.

Step 3a: Restore backup

If the time of compromise can be determined beyond doubt from the log files and a backup is available, restoring it and then updating and securing it is a good option.

Schritt 3b: Dateisystem bereinigen (WP + Plugins neu installieren)

To rule out that malware is still present in the core and wp-content directories, the WordPress core and all plugins must be reinstalled.

  1. Replace all WordPress system files; to do this, completely delete wp-admin/ and wp-includes/.
  2. Replace all plugins with clean versions; to do this, delete all folders in wp-content/plugins/, and the same applies to the theme.
  3. Find/delete all PHP files in wp-content/uploads/.

Even paid premium plugins must be reinstalled with a fresh installation package directly from the source - do not simply use the version from the backup here. Even a single overlooked malicious file is enough for the WordPress installation to be hacked again through it.

Schritt 4: Passwörter ändern

Changing all passwords goes without saying - FTP, MySQL (database), WordPress accounts, etc.
You should use strong passwords with uppercase/lowercase letters, numbers, and for maximum security, additional special characters.

To prevent your WordPress from being hacked again and again, regular updates must be carried out. Only this way can the highest possible level of security be maintained.
You can find additional security measures in our Securing WordPress blog article.

Symptoms of a hacked website

A common question is what attackers actually intend to achieve by compromising a website. Their primary goal at first is to gain control over the web account by planting web shells and to be able to regain access at any time via hidden backdoors - even if parts of the malicious files have already been deleted. This gives the attacker free rein and full control with virtually unlimited possibilities.
In essence, this can lead to the following symptoms sooner or later.

Redirects & pop-ups

When clicking on a Google search result, the actual page does not open. Instead, visitors are redirected to a completely different domain, usually with rather dubious content. A redirect or pop-ups may also only be triggered after entering the site, randomly while navigating through the hacked website. In some cases, this redirection occurs only sporadically, depending on the referrer & user-agent.

Spam sending

The classic case: hackers place a spam script well hidden on the webspace and use it to send large volumes of spam emails. The result can be blacklist entries, for example in the spamhaus.org database, which can disrupt email traffic. Fortunately, most web hosts detect the sending of mass emails, so in the best-case scenario this is stopped quickly.

Black-hat SEO

Large numbers of links with highly competitive keywords are placed within the content (pharma hacks are a typical example), or the content is completely replaced, including the meta description. The longer this condition continues, the more severe the losses in SEO rankings become.

spam

Distribution of viruses & malware

In this case in particular, the affected site must be taken offline immediately. Delivering a virus can have far-reaching consequences. Almost everyone has heard of ransomware. It is essential to prevent site visitors from becoming infected with malware.

Additional services

What our customers say about us

“My WordPress was hacked and repaired quickly. The prices are more than fair, and I can recommend the service without reservation. They are also willing to provide fast help outside regular business hours.” – FOTOPXL

“Within one day, everything was handled extremely professionally and extremely quickly. Very trustworthy. Excellent. 5 stars”
– Fernando V.

“After our WordPress installation was infected by a virus several times, we started looking for a professional. We were very satisfied with the handling and communication.”
– T. Vogt

“Our website was infected with a backdoor Trojan that we were unable to remove ourselves. We received fast and professional help — even late in the evening. Friendly manner throughout. Highly recommended.” – DREIPASS

“The contact was especially friendly, and some additional cosmetic work was taken care of on their own initiative — as if it were the most natural thing in the world. I am relieved and very grateful.”
– R. Mayer

“Excellent. In an absolute emergency, when 2 domains were blocked by Strato due to a hacker attack, both domains were temporarily brought back online the very same day.”
– I. Radchenko

Website-Bereinigung.de Support Service Google reviews

Contact options

This email address is being protected from spambots. You need JavaScript enabled to view it.
Contact form

Schedule a call
+49 (0)2406 969796
Mon. - Fri. | 9 am - 9 pm