Andrey Kucherov

A post-hack survival guide: cleaning your website after being hacked

survival-guide
Introduction Very often, web hosting administrators start to take security measures only after a website has been hacked. So, let us imagine the situation when ImunifyAV has been installed on such an infected server. All malware has been cleaned in one click, and all malicious activity has been stopped. Are we good to go? Are there any safety steps required? Actually, the answer is, "Yes, there are still some steps that can be taken after cleanup". Make sure you use all the product's benefits  Imunify360 consists of multiple modules, including a WAF, malware detection, Proactive Defense, IDS / IPS, and others. I recommend you check out the documentation for each part of the product to g...
Continue reading
Andrey Kucherov

When Linux antivirus lets you down: How to remove malware from a website manually

Manual-removing
By Andrey Kucherov, Malware Analyst at Imunify360 The detection rates of anti-malware and antivirus scanners varies considerably. Knowing how to manually scan for and remove malware is an important and useful skill with which to confirm a scanner's effectiveness or compensate for its failings. In this article, Andrey Kucherov, Malware Analyst at Imunify360, describes some essential manual website malware detection and cleanup techniques.   Introduction The reality of modern security creates new challenges for web hosts every day. It is well known that there is no absolute protection that guarantees a 0% chance of your website being hacked. Even major players in online markets suffer fro...
Continue reading
Andrey Kucherov

Host your website safely and avoid website cross-contamination issues

1
By Andrey Kucherov, Malware Analyst at Imunify360.  This article discusses the hidden pitfalls of hosting multiple websites on one hosting account, and how you can remediate the consequences of website cross-contamination. The structure of virtual hosting (also known as shared hosting) can be illustrated by a bee hive: each website (bee) has its own folder (cell). At the same time, all bees share the same hive (hosting account resources, such as disk space, database, RAM, CPU, etc.). In most cases, hosting companies do not provide resource isolation for shared hosting accounts (plans that let you host multiple websites on one account). In practice, that means that all website files are ...
Continue reading
Andrey Kucherov

What to do if your Website is Hacked: A Disaster Recovery Plan

website-hacked
Thousands of websites get hacked on a daily basis. Actually, thousands out of the many billions of websites on the Internet is quite a low percentage, but if you got unlucky and your website is among those, you need to take it seriously, and respond to the threat quickly and wisely. Unfortunately, very often, website owners are 100% sure that they won't ever be a victim, and do not have a valid disaster recovery plan for such cases. Or, if they do, the plan consists of just one bullet point: I was unlucky and the plan is to shut down my business. In this article, I cover that gap and offer you a solid disaster recovery plan if your website got hacked. Once Upon a Time, a Website Got Hacked… ...
Continue reading