PREV
NEXT
  • WordPress hacked?

    Measures for dealing with a hacked WordPress website

Help with a hacked WordPress site

Find malicious code & remove malware
..or have it reliably removed.

Around 43% of all websites on the web run on WordPress. Among content management systems, that corresponds to a market share of a full 61% (as of 2026).
WordPress's widespread use and popularity make the system an attractive target for hackers. In most cases, attacks are fully automated. The target is not individual companies or people, but known vulnerabilities in the core and in plugins. The main cause of hacked websites is therefore missed security updates. The same also applies to Joomla! as well as all other CMS and shop systems.

If your WordPress has been hacked, you’ll find here a summary of the most important repair steps along with a few tips.


Step 1: Disable the website - download backups

To avoid further damage, the website should be taken offline first and foremost.
Two proven options:

After that, download backups of all relevant data. In addition to the file system and the database, this also includes the server log files, which are essential for analyzing the hacking attack. These are either located in the /logs directory on the webspace or can be accessed via the web host's control panel.

Step 2: Analyze the breach - find the security vulnerability

For malware analysis, it is important that the timestamps of the downloaded files are preserved (option in the FTP program). To prevent any virus alert from interfering with the transfer, temporarily disable your local antivirus protection.

You can find potential malicious files as follows:

  • Inspect recently modified files
  • Go through the host's malware logs
  • Local scan of the data with good antivirus software
  • Check WordPress root directory
    • Look out for file names != .htaccess, index.php, wp-*.php, xmlrpc.php (by default, there are 15 PHP files in the WP root directory

Note the timestamp (file modification time) of each piece of malicious code found.
Attention! This can also be falsified - it may discreetly match the timestamps of the other files in the respective directory. The timestamps of the directories should also be taken into account.
Based on that:

  • Analyze the web server access logs
    • Suspicious POST entries
    • Typical attack patterns

You can find a helpful tool for identifying POST requests and further tips for analysis here.

Step 3a: Restore backup

If the time of compromise can be clearly determined from the log files and a backup is available, restoring it and then updating and securing it is the best course of action.

Step 3b: Clean the file system (reinstall WP + plugins)

To ensure that no malware remains in the core and wp-content directories, it is necessary to reinstall the WordPress core and all plugins.

  1. Replace all WordPress system files, deleting wp-admin/ and wp-includes/ completely.
  2. Replace all plugins with clean versions by deleting all folders in wp-content/plugins/; the same applies to the theme.
  3. Search for/delete all PHP files in wp-content/uploads/.

Paid premium plugins must also be reinstalled using a fresh installation package directly from the source - do not simply use the version from the backup here. Even a single overlooked malicious file is enough for the WordPress installation to be hacked again through it.

Step 4: Change passwords

Changing all passwords goes without saying - FTP, MySQL (database), WordPress accounts, etc.
You should use strong passwords with uppercase/lowercase letters, numbers, and, for maximum security, special characters as well.

To prevent your WordPress site from being hacked again and again, you must carry out regular updates. Only then can you maintain the highest possible level of security.
You can find additional security measures in our blog article Secure WordPress.

Symptoms of a hacked website

People often ask what attackers are trying to achieve by compromising a website. The initial main goal is to be able to control the web account by placing web shells and to regain access at any time via hidden backdoors - even if parts of the malicious files have already been deleted. This gives the attacker free rein and full control with virtually unlimited possibilities.
In essence, the following symptoms may occur sooner or later.

Redirects & pop-ups

When clicking on a Google search result, the actual page does not open; instead, you are redirected to a completely different domain with usually rather dubious content. A redirect or pop-ups can also be triggered only after entering the site, randomly while navigating the hacked website. Sometimes this redirect occurs only sporadically depending on the referrer & user agent.

Spam sending

The classic case - hackers place a spam script well hidden on the web space and use it for mass sending of spam emails. The result can be blacklist entries, e.g. in the spamhaus.org database, which disrupt email traffic. Fortunately, most web hosts detect the sending of mass emails, so in the best case this can be stopped quickly.

Black-hat SEO

Large numbers of links are placed within the content using highly competitive keywords (typical examples are pharma hacks), or the content is completely replaced including the meta description. The longer this state persists, the greater the losses in SEO rankings.

meta spam

Distribution of viruses & malware

In this case in particular, the affected site must be taken offline immediately. Delivering a virus can have far-reaching consequences. Everyone has probably heard of ransomware. It is essential to prevent site visitors from infecting themselves with malware.

Additional offers

Customers about us

“My Wordpress was hacked and repaired quickly. The prices are more than fair and I can recommend the service without reservation. They are not too proud to offer quick help even outside regular working hours.” – FOTOPXL

„Within one day, everything was done extremely professionally and extremely quickly. Very trustworthy. Excellent. 5 stars“
– Fernando V.

“After our Wordpress installation was infected by a virus several times, we started looking for a professional. We were very satisfied with the process and communication.”
– T. Vogt

“Our website was infected by a backdoor Trojan that we were unable to remove ourselves. We received quick and professional help - even late at night. Friendly manner. Highly recommended.” – DREIPASS

„The contact was exceptionally friendly, and some cosmetic additional work was taken care of on its own - as if it were completely natural. I am relieved and very grateful.“
– R. Mayer

„Great. In an absolute emergency, after 2 domains were blocked by Strato due to a hacker attack, both domains were initially temporarily back online the same day.“
– I. Radchenko

Website-Bereinigung.de support service Google Reviews

Contact options

This email address is being protected from spambots. You need JavaScript enabled to view it.
Contact form

Schedule a call
+49 (0)2406 969796
Mon. - Fri. | 9 am - 9 pm