Amsel logo

My WordPress Site Is Hacked – What Should I Do? (Step-by-Step Guide)

A hacked WordPress website can cause serious problems for your business. Visitors may be redirected to suspicious websites, Google may show security warnings, or the website may stop working entirely.

In many cases, website owners only discover the issue when customers report strange behavior or when the hosting provider temporarily suspends the website due to malware.

The good news is that most hacked WordPress sites can be cleaned and restored. The key is to act quickly to minimize damage to your website’s reputation, search rankings, and visitor trust.

Below is a practical guide explaining what to do if your WordPress site has been hacked.

Table of Contents

How to Tell If Your WordPress Site Has Been Hacked

There are several common warning signs that indicate a compromised WordPress website.

1. Visitors are redirected to suspicious websites

One of the most common hacks involves hidden redirects. When users visit your website, they may be redirected to casino sites, fake online stores, or malicious downloads.


2. Google shows a security warning

Google may display warnings such as:

“This site may be hacked”
“This site may harm your computer”

These warnings usually appear when Google detects malware, phishing pages, or spam content.


3. Hidden SEO spam appears on the website

Hackers often inject spam links or hidden pages designed to manipulate search rankings. These pages may promote casinos, pharmaceuticals, or scam websites.


4. The website becomes slow or unstable

Malicious scripts running in the background can consume server resources and slow down your website.


5. Your hosting provider suspends the website

Hosting companies often block hacked websites to prevent malware from spreading to other servers.


If you notice any of these signs, there is a high probability that your WordPress website has been compromised.

First Steps to Take Immediately

If your WordPress website is hacked, it’s important to respond quickly.

Change all passwords

Update the passwords for:

  • WordPress administrator accounts

  • hosting account

  • FTP or SFTP access

  • database access

If attackers gain access to one system, they may be able to access others as well.


Create a full website backup

Before making changes, create a complete backup of:

  • all website files

  • the WordPress database

This can help with investigation and recovery if something goes wrong.


Check administrator accounts

Review the list of users in the WordPress dashboard and look for:

  • unknown administrator accounts

  • suspicious usernames

  • recently created accounts

Remove any accounts you do not recognize.


Why WordPress Websites Get Hacked

Most WordPress hacks are automated attacks performed by bots scanning the internet for vulnerable websites.

Here are the most common causes.


Outdated plugins

Plugins with known vulnerabilities are one of the most common entry points for attackers.


Outdated WordPress core

Running an old version of WordPress can expose your website to vulnerabilities that have already been fixed in newer releases.


Nulled themes and plugins

Pirated themes and plugins often contain hidden malware or backdoors that allow attackers to access the site.


Weak passwords

Weak passwords make it easier for attackers to gain access through brute-force login attempts.


How to Clean a Hacked WordPress Site

Cleaning a hacked WordPress site usually requires several steps.

Remove malware from website files

All website files must be inspected to identify and remove:

  • malicious PHP code

  • injected scripts

  • hidden backdoor files


Reinstall WordPress core files

In many cases, the safest approach is reinstalling the WordPress core from a clean version to ensure no files have been modified.


Audit plugins and themes

This includes checking:

  • outdated plugins

  • vulnerable plugins

  • modified theme files

Plugins that pose a security risk should be removed or replaced.


Clean the database

Malicious content may also be injected into the database.

Examples include:

  • SEO spam links

  • hidden pages

  • malicious JavaScript code


Remove malicious redirects

Redirect malware is very common. Attackers inject code that redirects visitors to external websites without their knowledge.

This code must be removed from both the website files and server configuration.

Why WordPress Hacks Often Return

One of the most common mistakes is removing malware but leaving the vulnerability that caused the hack.

For example:

  • the vulnerable plugin remains installed

  • a hidden backdoor file is not removed

  • weak passwords remain unchanged

In these cases the website may become infected again.

That is why it is critical to identify and fix the root cause of the hack, not just remove the visible symptoms.

When to Contact a WordPress Security Specialist

If:

  • your website redirects visitors to suspicious pages

  • Google has flagged your website for malware

  • your hosting provider has suspended your website

  • malware keeps returning

it may be best to have the website professionally cleaned.

Malware can hide in multiple places, including website files, the database, or server configuration.

If you need help, we provide a service for hacked WordPress site recovery:

The goal is to remove malware, restore the website, and close the vulnerabilities that allowed the attack.

How to Prevent WordPress Hacks in the Future

After cleaning a hacked WordPress site, it is important to implement security best practices.

Recommended steps include:

  • keeping WordPress, plugins, and themes updated

  • using strong passwords

  • removing unused plugins and themes

  • creating regular backups

  • monitoring security alerts

Many businesses choose ongoing WordPress maintenance services to keep their websites secure and prevent future attacks.

FAQ – Hacked WordPress Sites

Yes, in most cases a hacked WordPress site can be cleaned and restored. This usually involves removing malware, restoring clean files, and fixing the vulnerability that allowed the attack.

The price depends on the complexity of the issue. Basic malware removal usually starts from around 150 €, while more complex cases may require additional work.

Yes. If the underlying vulnerability is not fixed, the website can be compromised again. Regular updates and security monitoring are essential for long-term protection.
Amsel
© All rights reserved 2025

Company

Amsel OÜ
Reg. No. 12705326
VAT No. EE102601585

Contact

Phone:  +372 58 374 687 Email: info@amsel.ee
})