Andrey Kucherov

A post-hack survival guide: cleaning your website after being hacked

Introduction Very often, web hosting administrators start to take security measures only after a website has been hacked. So, let us imagine the situation when ImunifyAV has been installed on such an infected server. All malware has been cleaned in one click, and all malicious activity has been stopped. Are we good to go? Are there any safety steps required? Actually, the answer is, "Yes, there are still some steps that can be taken after cleanup". Make sure you use all the product's benefits  Imunify360 consists of multiple modules, including a WAF, malware detection, Proactive Defense, IDS / IPS, and others. I recommend you check out the documentation for each part of the product to g...
Continue reading
Greg Zemskov

Why do small sites get hacked?

If you think your site won't be hacked because it's too small to matter, think again. I'll show why that is a false and dangerous assumption. Many site owners and webmasters think that hackers only care about popular, highly-ranked websites. They are wrong. High traffic volume helps boost earnings on partner programs by redirecting visitors to other sites, gets more views of unauthorized advertisements and attracts more clicks on rogue links. But that is not the only way hackers make money. Unprotected sites with low traffic volume are equally attractive to hackers. It is the way they are used that differs from how hackers monetize more popular websites. Any normal site, with an audience of ...
Continue reading
Andrey Kucherov

What to do if your Website is Hacked: A Disaster Recovery Plan

Thousands of websites get hacked on a daily basis. Actually, thousands out of the many billions of websites on the Internet is quite a low percentage, but if you got unlucky and your website is among those, you need to take it seriously, and respond to the threat quickly and wisely. Unfortunately, very often, website owners are 100% sure that they won't ever be a victim, and do not have a valid disaster recovery plan for such cases. Or, if they do, the plan consists of just one bullet point: I was unlucky and the plan is to shut down my business. In this article, I cover that gap and offer you a solid disaster recovery plan if your website got hacked. Once Upon a Time, a Website Got Hacked…H...
Continue reading
Greg Zemskov

How Spammers Spam

Twenty years on and spam is still a problem. I'll look at why that is and what we can do to reduce or prevent it. Contrary to popular belief, hacking a site and uploading malicious scripts onto it is not the only way spamming gets a foothold. There are other ways. For example, it could be because of a compromised account, the use of script vulnerabilities, or an incorrectly configured mail server. The diagram below shows an overview of the methods. ​ In this article, I'll look at the different ways unsolicited email (spam) can emanate from a web server, and some of the ways you can stop it. Spamming by hacking A hacked site or server is the most common reason behind an outbreak of spamming a...
Continue reading