Attacker.NET offers Free website security Plan & Malware Removal services for Charities

We are proud to announce that we provide free website security Plan for charities. We offer our Silver plan for FREE for approved charities. Please contact [email protected] for more details.

Plans & Pricing | Free Malware Scan

WordPress WP Live Chat Plugin is massively exploited in the wild and redirects to other spam websites

Any versions below 8.0.27 is vulnerable to this security issue and websites using older versions are likely hacked.

Hackers are exploiting it and injecting their malicious javascripts into files and database mainly in the “siteurl” and “home” rows in your wp_options table to cause redirects to other malicious websites such as:

letsmakesomechoice[.]com
garrygudini[.]com
blackawardago[.]com
detectnewfavorite[.]com
traveltogandi[.]com
funnwebs[.]com
destinylocation[.]info
leftoutsidemyprofile[.]info
yourservice[.]live
letstakemetoad[.]com

And many others.

Signup and Try our malware removal service and let’s clean & protect your websites!

You can check your website securityby using this website malware scanner

https://scan.attacker.net

Cómo limpiar un sitio web de WordPress hackeado en 10 sencillos pasos.

Crees que tu WordPress ha sido hackeado?

Si cree que su sitio web de WordPress ha sido pirateado y confirmó este sentimiento o sospecha utilizando algún complemento de seguridad o escáneres de malware de sitios web, como nuestro escáner de malware gratuito ubicado en https://scan.attacker.net , es mejor pedirle a un profesional que limpie su sitio web para garantizar que se limpie de forma completa y adecuada y que el SEO no se vea afectado. No dude en echar un vistazo a nuestro servicio de eliminación de malware de nuestro sitio web y https://attacker.net/website-security-plans-pricing

O siéntase libre de probar y seguir los pasos a continuación si desea intentar limpiarlo usted mismo:

Cómo saber y determinar si su sitio web fue hackeado?

  • ¿Ve algún contenido extraño, no reconocido o inapropiado en su sitio?
  • ¿Tu sitio comenzó a consumir más recursos o correr lento?
  • ¿Ve usuarios no reconocidos, usuarios administradores, FTP o cuentas de correo electrónico en su sitio?
  • ¿Archivos o carpetas no reconocidos?
  • Informes de clientes robado ¿Tarjeta de crédito después de comprar algo de su sitio web?
  • ¿Google Chrome, Firefox u otros navegadores muestran una advertencia roja cuando visitan su sitio web?
  • ¿Ve anuncios, ventanas emergentes o redireccionamientos no reconocidos a otros sitios?
  • ¿Tu proveedor de hosting suspendió tu cuenta de hosting?
  • Si su sitio aparece como hackeado o dañino en las búsquedas de Google.
  • Si recibe una advertencia de las herramientas para webmasters de Google u otras listas negras.
  • Si Google Adwords suspendió sus anuncios en ejecución.

Puede verificar la seguridad de su sitio web utilizando este escáner de malware gratuito del sitio web https://scan.attacker.net

Reparación de WordPress Hack y pasos de eliminación de malware:

1- El paso más importante es mantener la calma y la concentración. El estrés es contraproducente. Respira hondo y sigue leyendo.

2- Es muy importante generar un sitio web completo y una copia de seguridad de la base de datos.

3- Obtenga una copia nueva de WordPress en https://wordpress.org/download/ y comience por reemplazar sus carpetas principales de WordPress, tales como:

  • / wp-admin
  • / wp-incluye


La mayoría de las infecciones de malware de WordPress están dirigidas a los archivos y carpetas principales. Si el problema de malware / piratería persiste, debe revisar e investigar su carpeta wp-content y todos los temas y complementos que usa en el sitio web. Si continúa, entonces también debes verificar tu base de datos. También puede necesitar revisar su index.php, Archivo wp-config.php y .htaccess y otros archivos comunes para cualquier malware insertado e inyectado.

compare sus archivos en vivo actuales con la copia nueva que acaba de descargar usando el comando diff Linux o las herramientas de comparación de archivos como DiffNow o herramientas similares. Verifique todos los archivos reportados e infectados y límpielos o reemplácelos con una copia limpia.

4- Actualizar y actualizar WordPress, temas. y plugins una vez que limpies y elimines el malware / hack. Elimina los temas o complementos que no uses.

5- Revise a los usuarios administradores para detectar cualquier usuario administrador falso oculto creado por los hackers. Asegúrate de cambiar todas tus contraseñas.

6- Revise sus complementos y asegúrese de reconocerlos, los complementos falsos instalados y colocados por hackers son muy comunes. Elimina los complementos que no uses.

7- Una vez que haya terminado de limpiar su sitio web, es el momento de hacer una copia de seguridad completa del sitio web, incluida la copia de seguridad de la base de datos.

8- Escanee su computadora usando un buen software antivirus.

9- Verifique si su sitio web está en la lista negra de los motores de búsqueda o los proveedores de listas negras / antivirus (Google, Bing, Norton, McAfee, Yandex, etc.) y envíe las solicitudes de reconsideración y reindexación siempre que sea necesario para asegurarse de que su SEO y clasificación no se vean afectados. Por el hack.

10- Manténgase actualizado y actualizado, mantenga su wordPress, complementos, temas y todo actualizado y cambie sus contraseñas con frecuencia.

Regístrese ahora y vamos a limpiar y proteger sus sitios web!

Puede verificar la seguridad de su sitio web utilizando este escáner de malware gratuito.

https://scan.attacker.net

WordPress Blog Designer plugin vulnerability Redirecting to Malicious websites


Any versions below 1.8.10 is vulnerable to this security issue and websites using older versions are likely hacked.

Hackers are exploiting it and injecting their malicious javascripts into files and database mainly in the “siteurl” and “home” rows in your wp_options table to cause redirects to other malicious websites such as:

letsmakesomechoice[.]com
garrygudini[.]com
blackawardago[.]com
detectnewfavorite[.]com
funnwebs[.]com
destinylocation[.]info
leftoutsidemyprofile[.]info
yourservice[.]live
letstakemetoad[.]com

And many others.

Signup and Try our malware removal service and let’s clean & protect your websites!

You can check your website securityby using this website malware scanner

https://scan.attacker.net



WordPress Yuzo Related Posts plugin vulnerability – Thousands of WordPress websites have been Hacked

Hackers are exploiting it and injecting their malicious javascripts into files and database mainly in the “siteurl” and “home” rows in your wp_options table to cause redirects to other malicious websites such as:

hellofromhony[.]com
hellofromhony[.]org
destinywall[.]org
clevertrafficincome[.]com
notifymepush[.]info
pushmeandtouchme[.]info
click.newsfeed[.]support
visnu[.]icu
premium-mobile[.]info
plutonium[.]icu
monitornotifyfriends[.]info
notifymepush[.]info

And many others.

Signup and Try our malware removal service and let’s clean & protect your websites!

You can check your website securityby using this website malware scanner

https://scan.attacker.net



YellowPencil WordPress Plugin Vulnerability is largely exploited

Any versions below 7.2.0 is vulnerable to this security issue and is likely hacked.

Hackers are exploiting it and injecting their malicious javascripts into files and database mainly in the “siteurl” and “home” rows in your wp_options table to cause redirects to other malicious websites such as:

hellofromhony[.]com
hellofromhony[.]org
destinywall[.]org
clevertrafficincome[.]com
notifymepush[.]info
pushmeandtouchme[.]info
click.newsfeed[.]support
visnu[.]icu
premium-mobile[.]info
plutonium[.]icu
monitornotifyfriends[.]info
notifymepush[.]info

And many others.

Signup and Try our malware removal service and let’s clean & protect your websites!

You can check your website securityby using this website malware scanner

https://scan.attacker.net

**Update: They released a fix: https://yellowpencil.waspthemes.com/docs/important-security-update/



Stored XSS vulnerability found in Social Warfare plugin causing Redirects to Malicious websites

If you use the Social Warfare plugin for WordPress then you are likely vulnerable to this security issue or already hacked.

You can check your website security by using this free website malware scanner https://scan.attacker.net

The vulnerability was mainly found in version v 3.5.2 and it’s being exploited for some time.

Hackers are exploiting it and injecting javascripts into files and database mainly in the social_warfare_settings in your wp_options table to cause redirects to other malicious websites such as:

setforspecialdomain[.]com

setforconfigplease[.]com

getmyfreetraffic[.]com

redrentalservice[.]com

strangefullthiggngs[.]com

and many others.

Signup and Try our malware removal service and let’s clean & protect your websites!

You can check your website securityby using this website malware scanner

https://scan.attacker.net

Vulnerability found in WordPress Easy WP SMTP plugin causing Malicious Redirects to other sites

If you use Easy WP SMTP plugin for wordpress then you are likely vulnerable to this security issue or already hacked.

You can check your website security by using this free website malware scanner https://scan.attacker.net

The vulnerability was mainly found in version v 1.3.9 and it’s being exploited for some time.

Hackers are exploiting it and injecting javascripts into files and database to cause redirects to other malicious websites such as:

setforspecialdomain[.]com

setforconfigplease[.]com

getmyfreetraffic[.]com

redrentalservice[.]com

strangefullthiggngs[.]com

and many others.

Signup and Try our malware removal service and let’s clean & protect your websites!

You can check your website securityby using this website malware scanner

https://scan.attacker.net

How to clean a hacked Drupal website


Do you think your Drupal has been hacked?

If you think that your Drupal website is hacked and you confirmed this feeling or suspicion using any security plugins or website malware scanners such as our free malware scanner located at https://scan.attacker.net then it’s better to ask a professional to clean your website to ensure it’s fully and properly cleaned and SEO remains unaffected. Feel free to take a look at our website malware removal service and https://attacker.net/website-security-plans-pricing

Or feel free to try and follow the below steps if you want to try cleaning it yourself:

How to tell and determine if your website was hacked?

  • Do you see any strange, unrecognized or inappropriate content on your site?
  • Your site started consuming more resources or running slow?
  • Do you see unrecognized users, admin users, FTP or email accounts on your site?
  • Unrecognized files or folders?
  • Customer reporting stolen credit card after purchasing something from your website?
  • Google Chrome, Firefox or other browsers showing a red warning when visiting your website?
  • Do you see any unrecognized ads, popups or redirects to other sites?
  • Your hosting provider suspended your hosting account?
  • If your site is listed as hacked or harmful in Google searches.
  • If you receive a warning from Google webmaster tools or other blacklists.
  • If Google Adwords suspended your running Ads.

You can check your website security by using this free website malware scanner https://scan.attacker.net

Drupal Hack repair and malware removal steps:

1- The most important step is to stay calm and focused. Stress is a counterproductive. Take a deep breath and continue reading.

2- It’s very important to generate a full website and database backup.

3- Get a fresh Drupal copy from https://www.drupal.org/download and compare your current live files to the fresh copy you just downloaded using diff Linux command or file comparison tools such as DiffNow or similar tools. Check all reported and infected files and clean or replace it with a clean copy.

You can also use this SSH command to list all modified files in the last 7 days:


find . -type f -mtime -7

Most Drupal malware infections are targeting the core files and folders. If the malware/hack issue remains then you need to check and investigate your themes and plugins that you use on the website. If it continues, then you need to check your database too. You may also need to check your index.php , configuration.php and .htaccess file and other common files for any inserted and injected malware.

4- Update and upgrade Drupal, themes and plugins once you clean and remove the malware/hack. Remove any themes or plugins you don’t use.

5- Review your administrator users for any hidden fake admin users created by the hackers. Make sure to change all of your passwords.

6- Review your plugins and make sure you recognize all of it, Fake plugins installed and placed by hackers are very common. Remove any plugins you don’t use.

7- Once you are done cleaning your website, It’s the time to make a full website backup including database backup.

8- Scan your computer using a good anti-virus software.

9- Check if your website is blacklisted by any search engines or blacklists / anti-virus vendors (Google, Bing, Norton, McAfee, Yandex, etc) and submit reconsideration and reindexing requests whenever needed to make sure your SEO and ranking is not affected by the hack.

10- Stay current and up2date, Keep your Drupal, plugins, themes and everything updated and frequently change your passwords.

Signup now and let’s clean & protect your websites!

You can check your website security by using this free website malware scanner https://scan.attacker.net

How to Clean a Hacked WordPress website in 10 simple steps.

Do you think your WordPress has been hacked?

If you think that your WordPress website is hacked and you confirmed this feeling or suspicion using any security plugins or website malware scanners such as our free malware scanner located at https://scan.attacker.net then it’s better to ask a professional to clean your website to ensure it’s fully and properly cleaned and SEO remains unaffected. Feel free to take a look at our website malware removal service and https://attacker.net/website-security-plans-pricing

Or feel free to try and follow the below steps if you want to try cleaning it yourself:

How to tell and determine if your website was hacked?

  • Do you see any strange, unrecognized or inappropriate content on your site?
  • Your site started consuming more resources or running slow?
  • Do you see unrecognized users, admin users, FTP or email accounts on your site?
  • Unrecognized files or folders?
  • Customer reporting stolen credit card after purchasing something from your website?
  • Google Chrome, Firefox or other browsers showing a red warning when visiting your website?
  • Do you see any unrecognized ads, popups or redirects to other sites?
  • Your hosting provider suspended your hosting account?
  • If your site is listed as hacked or harmful in Google searches.
  • If you receive a warning from Google webmaster tools or other blacklists.
  • If Google Adwords suspended your running Ads.

You can check your website security by using this free website malware scanner https://scan.attacker.net

WordPress Hack repair and malware removal steps:

1- The most important step is to stay calm and focused. Stress is a counterproductive. Take a deep breath and continue reading.

2- It’s very important to generate a full website and database backup.

3- Get a fresh WordPress copy from https://wordpress.org/download/ and start with replacing your WordPress core folders such as:

  • /wp-admin
  • /wp-includes


Most WordPress malware infections are targeting the core files and folders. If the malware/hack issue remains then you need to check and investigate your wp-content folder and all themes and plugins that you use on the website. If it continues, then you need to check your database too. You may also need to check your index.php , wp-config.php and .htaccess file and other common files for any inserted and injected malware.

compare your current live files to the fresh copy you just downloaded using diff Linux command or file comparison tools such as DiffNow or similar tools. Check all reported and infected files and clean or replace it with a clean copy.

4- Update and upgrade WordPress, themes and plugins once you clean and remove the malware/hack. Remove any themes or plugins you don’t use.

5- Review your administrator users for any hidden fake admin users created by the hackers. Make sure to change all of your passwords.

6- Review your plugins and make sure you recognize all of it, Fake plugins installed and placed by hackers are very common. Remove any plugins you don’t use.

7- Once you are done cleaning your website, It’s the time to make a full website backup including database backup.

8- Scan your computer using a good anti-virus software.

9- Check if your website is blacklisted by any search engines or blacklists / anti-virus vendors (Google, Bing, Norton, McAfee, Yandex, etc) and submit reconsideration and reindexing requests whenever needed to make sure your SEO and ranking is not affected by the hack.

10- Stay current and up2date, Keep your wordPress, plugins, themes and everything updated and frequently change your passwords.

Signup now and let’s clean & protect your websites!

You can check your website security by using this free website malware scanner

https://scan.attacker.net