top of page
  • Writer's picturebeingwpthemes

How to remove malware from your wordpress website

As a WordPress site owner, developer, agency, there is nothing worse than waking up in the morning and found that your site infected with malware.


It is even worse when you really have no idea what to do and from where to start to remove the malware from your WordPress website.


Well, this guide is for you to make removal of malware from your WordPress site easier.


Use malware byte


Malware can affect your WordPress in different ways, one of which is if your computer has a virus that is releasing your FTP password. This is very normal.


So, first of all, is to ensure your computer is virus-free. We prescribe scanning in any event with MalwareBytes, and to be doubly sheltered, another anti-virus, for example, Kaspersky and AVG.


Upload Your Images from the Backup


Now comes to a tricky task, You have to recover your old image records duplicated up to the new wp-content > uploads organizer on the server.


Be that as it may, you would prefer not to duplicate any hacked documents in the process.


You will need to carefully inspect every single year/month envelope in your reinforcement and look inside every organizer and ensure there are ONLY image records and no PHP documents or JavaScript records or whatever else you didn't transfer to your Media Library.


This is boring. When you have favored every year/month envelope, you can transfer these to the server utilizing FTP.


List files by modification date


Probably the quickest approaches to recognize possibly hazardous documents is to get to by means of FTP and sort them by modification date. Subsequently, the principal spots will show up the individuals who have endured some kind of progress as of late.


In the event that we have not transformed anything in them, it tends to be a symptom that there is some sort of code that is causing the issue.


The issue with this framework is that you ought to experience every one of the folders that are a piece of the site to find every one of the contaminated documents, an occupation that could be exceptionally tedious if the code has been inserted in an enormous number of records.


Once you complete with the backup of your site, now download the backup and open the zip file. You will see:


Wordpress core files:


All WordPress core files: download WordPress directly from wordpress.org and go through the files in the downloads. You may think you do not need these files, but you might need them later.


The wp-config.php file:


It is very important as it consists of the username, name, and password to your wp database which can be used in the process of restoration.


.htaccess file


This will not be visible to you. The one and the only way to know if you backed this up is to see your backup folder by utilizing an HTTP program that allows you to see invisible files within the application’s interface.


The wp-content holder

Under this folder, you will see three different folders; uploads, themes, and plugins. Check out these folders.


There you will see your uploaded images, plugins and themes, that means you have a strong back up of your WordPress website. This is among the main folders you have to restore for your website.


The database:

Have a backup of your SQL file. It is always good to have a backup.


After you have checked you have a decent and complete backup of your website, erase all the files in your public_html folder (with the exception of the cgi-receptacle folder and any server related folders that are clearly free of hacked files) utilizing the web host's File Manager.


I prescribe the File Manager because it's significantly faster than erasing files via FTP. On the off chance that you are comfortable with SSH, at that point that will be fast as well. Make certain to see invisible files to erase any traded off .htaccess files as well.


In the event that you have different sites that you are hosting on a similar platform, you can accept they have all been compromised also.


Cross infection is normal. You should clean ALL the sites, so back them all up, download the backups, and do the accompanying strides for everyone.


I know this sounds extreme, be that as it may, genuinely, attempting to scan for and discover all the hacked files on a server is completely difficult. Simply ensure every one of your backups is finished.


What's more, don't simply clean one site and afterward clean the other relaxed as in the time it takes you to clean one, at that point other that is as yet contaminated can re-taint the one you just cleaned. Treat it like the bubonic plague.


Reinstall plugins


Reinstall your all plugins from the wp repository. Do not install plugins that are old and no longer maintained.


Reinstall themes


Reinstall your all themes, if you reference your backup files, customized your themes, reciprocate the changes on the new copy of the theme.  avoid uploading old themes, as you might not recognize which files were been hacked.


Quick and Dirty Hack Repair


Sucuri comes with a comprehensive guide that contains all important how to use the plugin to help the process further.  Know some amazing features of Sucuri plugin;


Its important features:


  • Quick access to error logs

  • Tool to reset user password

  • Use this plugin yo scan core files  and delete/replace ones that have been altered

  • Power to reset encryption salts

  • Power to reinstall all the plugins automatically

Finding the cause of the hack


It is not easy for a beginner to find out the cause of Wordpress hack. Take help of online tutorials then find out the type of hack you encountered. Find out why it occurred and then try to fix it.


Now it's time to remove our website from the blacklist. You may know that Google penalizes the affected site and mark that site as infected at Search Engines.


Through search, console send the request to Google for the removal warning from their SERPs.


Use these steps to remove malware from your WordPress website.


Our Best Recommandation

8 views0 comments
bottom of page