by Monte Persinger | News, Web Site Virus and Malicious Code Removal |

Malicious code injection on web sites is a huge problem on the Internet today.  We are seeing more and more web sites every day that are infected with malicious code and viruses.  You could have a virus installed on your web site without even knowing about it.  In order to keep your web site safe you need to monitor the health of your web site using available tools like Google Webmaster Tools, AVG web tools, Securi SiteCheck and others.

Step 1 is to find out if your web site has a virus.  You can go to Securi SiteCheck to do a scan or go to AVG Online Virus Scanner to check for malicious code, trojans and viruses.  It is very common for web pages to get infected with Internet garbage.  If you have a web site you need to monitor it for viruses.

Step 2 is to clean your web site.  You can hire a professional to do it for you or do it yourself.  IDP has a lot of experience finding and removing malware from web sites over the last 10 years.  First you have to find it and then you have to remove it.  If you can figure out the date it was infected, you can restore a backup of the site.  Or you can manually go thru and remove the code.  The malicious code is normally injected in .js javascript files.  Usually these are automated programs surfing the Internet and automatically injecting code into .js files and any other files they can get into.  Content management system web sites are especially vulnerable to code injection.  CMS web sites have a lot more code and Javascript than static HTML sites, so there are more opportunities and more files to inject junk into.  We have seen a ton of Joomla and WordPress code injections.  It can be a really big mess.  Once you locate the code, you can usually find a pattern of how it was injected.  For example, look at the last line of code in your .js files.  Or search all of the files on the web site for a unique phrase within the malicious code once you find it.  You can also view source on your web pages and scan the code for unusual scripts.  A professional can look at your source code and find the malware pretty easily.  These are normally automated scripts and there is not a whole lot of effort to hide the code.

Step 3 is to lock down your site.  Change your FTP passwords and other site passwords.  Reset the file permissions in your web hosting account.  On some sites that get infected a lot, because of the software or whatever, we have made all files read only.  If you need to make a web site change, change the file permissions to allow the edit, then switch it back to read only.  This is a little extreme but it works.

Step 4 is to report that your web site is clean.  You can setup an account with Google Webmaster Tools and AVG.  If your site is blacklisted you can request review.

At IDP we setup all of our web sites in our Google Webmaster Tools accounts.  We monitor your web site for you.  We also clean and fix infected sites.  If you need help with virus removal or notification and prevention contact IDP today for help.

How to Clean a Hacked WordPress Site

Managed WordPress Hosting

Fully Managed WordPress hosting available for $300 per year.  Host it with us and forget it.  Fully managed WordPress updates, security, backups, disaster recovery, malware monitoring and malware removal. Click below to purchase.

[purchase_link id=”1012″ text=”Purchase” style=”button” color=”orange”]

Web Site Virus and Malicious Code Removal Service was last modified: September 17th, 2013 by Monte Persinger
Please Share: