{"id":12187,"date":"2024-02-16T07:03:00","date_gmt":"2024-02-16T06:03:00","guid":{"rendered":"https:\/\/www.combell.com\/en\/blog\/?p=12187"},"modified":"2024-06-18T11:34:07","modified_gmt":"2024-06-18T09:34:07","slug":"website-hacked","status":"publish","type":"post","link":"https:\/\/www.combell.com\/en\/blog\/website-hacked\/","title":{"rendered":"&#8220;Help! My website has been hacked, what now?&#8221;"},"content":{"rendered":"<p><strong>Are you reading this article while your website is hacked? What a downer. That's no laughing matter. However, you shouldn't just sit and cry about it. Take control again. We'll tell you what to do next after a hack.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-cd63dec7     \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t><\/p>\n<div class=\"uagb-toc__wrap\">\n<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\t<strong>Table of contents<\/strong>\t\t\t\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox= \"0 0 384 512\"><path d=\"M192 384c-8.188 0-16.38-3.125-22.62-9.375l-160-160c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0L192 306.8l137.4-137.4c12.5-12.5 32.75-12.5 45.25 0s12.5 32.75 0 45.25l-160 160C208.4 380.9 200.2 384 192 384z\"><\/path><\/svg>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<div class=\"uagb-toc__list-wrap\">\n<ol class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#more-en-more-websites-get-hacked\">More en more websites get hacked<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#is-your-website-actually-hacked\">Is your website actually hacked?<\/a><\/li>\n<ul class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#this-may-indicate-hacking\">This may indicate hacking:<\/a><\/li>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"uagb-toc__list\"><a href=\"#website-hacked-now-what\">&quot;Website hacked, now what?&quot;<\/a><\/li>\n<ul class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#dont-panic\">Don&#039;t panic<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#inform-your-hosting-provider\">Inform your hosting provider<\/a><\/li>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"uagb-toc__list\"><a href=\"#decide-whether-to-take-your-serverwebsite-offline-or-not\">Decide whether to take your server\/website offline or not<\/a><\/li>\n<ul class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#change-all-passwords-on-all-devices\">Change all passwords on all devices<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#also-check-other-websites-and-servers\">Also, check other websites and servers<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#make-a-backup\">Make a backup<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#communicate-with-your-customers\">Communicate with your customers<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#find-out-how-the-hacker-gained-access\">Find out how the hacker gained access<\/a><\/li>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"uagb-toc__list\"><a href=\"#arming-yourself-against-future-attacks\">Arming yourself against future attacks<\/a><\/li>\n<ul class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#maintenance-and-updates\">Maintenance and updates<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#managed-wordpress-everything-to-make-your-life-easier\">Managed WordPress: everything to make your Life easier<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#proactively-backup-your-data\">Proactively backup your data<\/a><\/li>\n<\/ul>\n<\/ul>\n<\/ul>\n<\/ul>\n<\/ol><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-e7bc811d uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Website hacked? We'll restore* your website with SiteSweep<\/p>\n<div class=\"uagb-notice-text\">\n<p>With <a href=\"https:\/\/www.combell.com\/en\/sitesweep\">SiteSweep<\/a>, we restore your hacked website. Malicious code is removed so you can be online quickly and safely again. *For now, only Combell customers can use SiteSweep.<\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">More en more websites get hacked<\/h2>\n<p>Experts worldwide agree: in the coming years, we will face even more cyber attacks. <a href=\"https:\/\/www.vrt.be\/vrtnws\/nl\/2021\/12\/24\/we-krijgen-in-2022-nog-meer-cyberaanvallen-net-zoals-virologen\/\" rel=\"noreferrer noopener\" target=\"_blank\">Various organizations<\/a>, regardless of their size, are experiencing their websites being hacked. Unfortunately, the trend seems unstoppable.<\/p>\n<p><a href=\"http:\/\/Digitaletoekomst.be\" rel=\"noreferrer noopener\" target=\"_blank\">Digitaletoekomst.be<\/a>, the information and inspiration hub for Flemish businesses (coordinated by VLAIO, the Agency for Innovation &amp; Entrepreneurship on behalf of the Flemish government), hopes that sole proprietors and SMEs will improve their security against hacking. Their <a href=\"https:\/\/www.digitaletoekomst.be\/nl\/cyber-security\/nieuws\/10-cybersecurity-trends-voor-2023\" rel=\"noreferrer noopener\" target=\"_blank\">security advice<\/a> will help you get started.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Is your website actually hacked?<\/h2>\n<p>It could unfortunately be the case that your business is the next <strong>victim<\/strong>. Being hacked is no longer a distant concern. Before you go into full panic mode, you need to make sure whether your website or online shop has actually been hacked.<\/p>\n<p>It's possible that you're just facing IT issues, and there's no criminal activity involved.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-hacker-1-1024x731.png\" alt=\"An unknown piece of JavaScript could indicate hacking.\" class=\"wp-image-12268\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-hacker-1-1024x731.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-hacker-1-300x214.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-hacker-1-768x549.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-hacker-1.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">An unknown piece of JavaScript could indicate hacking.<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">This may indicate hacking:<\/h3>\n<p><strong>For servers:<\/strong><\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-3032e8ee uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-bc665fc7 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You discover suspicious cron jobs (automated tasks that were not set up by you).\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You discover suspicious cron jobs (automated tasks that were not set up by you).<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-4acbd343 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You suddenly find yourself on blacklists for spam (certain malware uses your server to send spam emails).\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You suddenly find yourself on blacklists for spam (certain malware uses your server to send spam emails).<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-75cd8234 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Extra activity in the server logs.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Extra activity in the server logs.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-b96aeb0b uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Increased server load (cryptomining).\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Increased server load (cryptomining).<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-bee8ae01 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Applications going offline.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Applications going offline.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-ace37e5d uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"...\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">...<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><strong>For websites:<\/strong><\/p>\n<div class=\"wp-block-uagb-icon-list uagb-block-59173472 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-cb4d4d96 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Your browser notifies you that your website has been hacked (because it has detected dangerous or malicious code). Screen for this notification.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Your browser notifies you that your website has been hacked (because it has detected dangerous or malicious code). <a href=\"https:\/\/support.google.com\/websearch\/answer\/190597?hl=en\" target=\"_blank\" rel=\"noreferrer noopener\">Screen for this notification.<\/a><\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-ee8fc7ba uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Your hosting provider informs you that your website has been hacked (because dangerous code has been detected).\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Your hosting provider informs you that your website has been hacked (because dangerous code has been detected).<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-ad514e2a uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"In the Google search results for your website, you see the following message: &quot;This site may have been hacked or contain dangerous code.&quot;\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">In the Google search results for your website, you see the following message: \"This site may have been hacked or contain dangerous code.\"<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-d1d0e4ab uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You notice that your website is unavailable, loads very slowly, or crashes regularly.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You notice that your website is unavailable, loads very slowly, or crashes regularly.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-57c19f2c uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You can no longer log in to your Content Management System (CMS) or the management tool for your website (hackers may have changed the passwords).\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You can no longer log in to your Content Management System (CMS) or the management tool for your website (hackers may have changed the passwords).<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-fca0beb4 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You see a significant decrease in your website's traffic (certain malware redirects visitors to other websites).\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You see a significant decrease in your website's traffic (certain malware redirects visitors to other websites).<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-ce030127 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You discover unknown user accounts in your CMS.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You discover unknown user accounts in your CMS.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-22a2a46a uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You notice that unknown plugins or scripts have been installed.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You notice that unknown plugins or scripts have been installed.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-1828e062 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"You see pop-ups that have nothing to do with your website.\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">You see pop-ups that have nothing to do with your website.<\/span><\/div>\n<div class=\"wp-block-uagb-icon-list-child uagb-block-73a944b8 uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"...\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">...<\/span><\/div>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">\"Website hacked, now what?\"<\/h2>\n<p>If after checking it turns out that your website has been hacked, you need to <strong>quickly go through several steps.<\/strong> You need to try to limit the damage and regain control of your applications.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Don't panic<\/h3>\n<p>Easier said than done. We completely understand that. However, it is extremely important to remain calm and do the right thing. After all, the damage has already been done. There's nothing you can do to change that. Make the best of what you have. That way, you can try <strong>to minimize the consequences of the hacking as much as possible.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-35ef97cc uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Tip<\/p>\n<div class=\"uagb-notice-text\">\n<p>Want to be able to sleep soundly at all times? If you're a larger company, work with your hosting partner to develop a <strong><a href=\"https:\/\/www.combell.com\/en\/blog\/what-is-business-continuity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Business Continuity plan<\/a>. That way, you always have a crisis plan on hand. If things need to move faster, you can still launch a <a href=\"https:\/\/www.combell.com\/en\/disaster-recovery\" target=\"_blank\" rel=\"noreferrer noopener\">Disaster Recovery plan<\/a>.<\/strong><\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"366\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/cms-logos-wp-highlight-versions-1024x366.jpg\" alt=\"Combell ensures that you are not working on outdated versions of your CMS. (photo)\" class=\"wp-image-12261\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/cms-logos-wp-highlight-versions-1024x366.jpg 1024w, https:\/\/www.combell.com\/en\/blog\/files\/cms-logos-wp-highlight-versions-300x107.jpg 300w, https:\/\/www.combell.com\/en\/blog\/files\/cms-logos-wp-highlight-versions-768x274.jpg 768w, https:\/\/www.combell.com\/en\/blog\/files\/cms-logos-wp-highlight-versions.jpg 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Combell ensures that you are not working on outdated versions of your CMS. (photo)<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Inform your hosting provider<\/h3>\n<p>If you host your website or server yourself, you'll need to take action on your own or consult a security expert. However, if you have a hosting provider, your first task is to inform them. This is especially true if you have <a href=\"https:\/\/www.combell.com\/en\/managed-hosting\" target=\"_blank\" rel=\"noreferrer noopener\">managed hosting<\/a> and your provider hasn't already notified you.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Collaborating with a professional hosting provider is crucial for protecting your websites.<\/p>\n<\/blockquote>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>Hosting providers have experience with these kinds of scenarios and can offer assistance or advise you on the best course of action. Once you're back on track, you can <strong>discuss additional layers of protection for your site or shop.<\/strong> Collaborating with a professional hosting provider is essential for protecting your websites.<\/p>\n<p><strong>As an example,<\/strong> every Combell customer using our <a href=\"https:\/\/www.combell.com\/en\/blog\/what-is-shared-hosting\/\" target=\"_blank\" rel=\"noreferrer noopener\">shared hosting<\/a> receives the standard protection of our robust <a href=\"https:\/\/www.combell.com\/en\/blog\/what-is-combell-shield\/\" target=\"_blank\" rel=\"noreferrer noopener\">Combell Shield<\/a>. This digital shield combines various defense systems, <strong>frustrating hackers to no end!<\/strong> They don't stand a chance against us.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-e2edce3b uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Also read<\/p>\n<div class=\"uagb-notice-text\">\n<p>How choosing the right hosting company has a significant impact on your <a href=\"https:\/\/www.combell.com\/en\/blog\/choice-hostingcompany-impact-cyber-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity<\/a>.<\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Decide whether to take your server\/website offline or not<\/h2>\n<p>A common advice you often come across is to make the server 'unavailable' by unplugging the network cable or power cable.<\/p>\n<p><strong>But is that a good idea?<\/strong> By simply taking the server offline or shutting it down, you may indeed destroy a lot of evidence and\/or valuable information about how the hacker gained access.<\/p>\n<p>So when do you choose which method? When you are fairly certain that it involves <a href=\"https:\/\/en.wikipedia.org\/wiki\/Script_kiddie\" target=\"_blank\" rel=\"noreferrer noopener\">script kiddies<\/a>, you can indeed isolate and restore the server immediately. If you choose to do so, you should follow some <strong>basic rules <\/strong>first:<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<ol>\n<li>You have detected the hack within 24 hours.<\/li>\n<li>You want to be operational again quickly (recovery is more important than forensics).<\/li>\n<li>Your server is not a virtual machine or a container that can take a snapshot of the server's memory.<\/li>\n<li>You do not intend to prosecute the hacker.<\/li>\n<li>You believe that the hacker still has certain software running on your server.<\/li>\n<\/ol>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>If it is a targeted attack, in technical terms an <a href=\"https:\/\/en.wikipedia.org\/wiki\/Advanced_persistent_threat\" target=\"_blank\" rel=\"noreferrer noopener\">Advanced Persistent Threat (APT)<\/a>, it is better to try to collect as much information as possible through <a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_forensics\" target=\"_blank\" rel=\"noreferrer noopener\">digital forensics<\/a> or track down the hacker before taking the server offline or shutting it down.<\/p>\n<p>Of course, you must ensure that the damage cannot increase and that the hacker cannot collect more data or information. Contact Combell to determine if taking your server offline is a good plan. Every case is different.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/strong-password-1024x731.jpg\" alt=\"To prevent a hacked website? Never use insecure passwords. \" class=\"wp-image-12267\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/strong-password-1024x731.jpg 1024w, https:\/\/www.combell.com\/en\/blog\/files\/strong-password-300x214.jpg 300w, https:\/\/www.combell.com\/en\/blog\/files\/strong-password-768x549.jpg 768w, https:\/\/www.combell.com\/en\/blog\/files\/strong-password.jpg 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">To prevent a hacked website? Never use insecure passwords. <\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Change all passwords on all devices<\/h3>\n<p>Replace all passwords \u2013 and we mean truly ALL passwords \ud83d\ude09 \u2013 that were used on the server. This includes passwords for email, control panels, CMS systems... <strong>Do this on all devices that had access to the hacked website or server.<\/strong><\/p>\n<p>For those desiring strong passwords, utilize upper and lower case letters, incorporate special characters, and opt for longer passwords...<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-b0d8df94 uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Tip<\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/en\/help\/kb\/what-measures-can-i-take-to-prevent-my-site-from-being-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener\">Take these seemingly logical measures to fortify the security of your website.<\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Also, check other websites and servers<\/h3>\n<p>If there is a possibility that the hacker who compromised the website or server also had access to other websites or servers, thoroughly inspect them. Pay <strong>extra attention<\/strong> to servers containing any important or sensitive data.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Make a backup<\/h3>\n<p>Create a complete backup of your hacked website or server. This is NOT the backup you will later use to restore everything, as the malware is also present in this backup.<\/p>\n<p>This backup is primarily intended to preserve as much <strong>evidence<\/strong> as possible about the hack and what the hacker has done.<\/p>\n<p>Having a backup on hand is, of course, essential to continue working. We'll get back to this in a moment!<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Communicate with your customers<\/h3>\n<p>When your site is hacked, direct communication with customers and stakeholders is crucial. <strong>This open communication ensures that customers continue to trust you.<\/strong> They will notice your engagement and dedication in the way you resolve the issues.<\/p>\n<p>This clear communication enables customers to take action themselves (such as changing weak passwords) and contributes to the recovery of your reputation and customer loyalty. Especially if you also communicate about how you have managed to improve security.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Find out how the hacker gained access<\/h3>\n<p>Once all of this is done, you can begin your <strong>post-mortem investigation.<\/strong> The goal is to determine what went wrong, how the hacker managed to get in, and what damage they were able to cause.<\/p>\n<p>Involve your hosting provider in this process. Here at Combell, we have real experts who bear a strong resemblance to Sherlock Holmes. \ud83e\uddd0<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Arming yourself against future attacks<\/h2>\n<p>All the actions listed above are what you need to do when you've been hacked. But wouldn't it be better to prevent those problems? To not give those scoundrels of hackers a chance?<\/p>\n<p>You can take various measures to protect your website or online store, along with all associated data. Talk about valuable information!<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Maintenance and updates<\/h3>\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/installing-updates-quickly-a-must-for-better-security\/\" rel=\"noreferrer noopener\" target=\"_blank\">Regular updates<\/a> of all systems are a crucial security mechanism. When Content Management Systems (CMSes) like WordPress or Drupal don't receive updates, they become highly <strong>vulnerable to <em>zero-day<\/em> attacks.<\/strong><\/p>\n<p>Zero-day attacks are attacks in which a hacker immediately exploits a software vulnerability, even before an update can be applied to fix that problem.<\/p>\n<p>Do you have a <strong>WordPress website?<\/strong> The chances are high, as WordPress is a super user-friendly CMS. But - let's be honest - it requires a lot of updates.<\/p>\n<p>For instance, your website's theme and various WordPress plugins. If you neglect this maintenance, your website becomes an easy target for hackers. This is a consequence of outdated software.<\/p>\n<p>Did you know that so-called 'Cross-site Scripting' is the <strong>most common vulnerability in WordPress plugins?<\/strong> Hackers cleverly exploit this by sending malicious software (such as a virus or hidden file) to the user's browser via a script.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Managed WordPress: everything to make your Life easier<\/h3>\n<p>If you don't have the time to perform all those updates or if you're not familiar with them, consider opting for <a href=\"https:\/\/www.combell.com\/en\/hosting\/managed-wordpress\" rel=\"noreferrer noopener\" target=\"_blank\">Managed WordPress<\/a> at Combell. With this service, we check your site daily to see if updates are available for its components.<\/p>\n<p>If updates are available, we first test them out, and if they are compatible with your website, we apply the updates immediately. You won't notice anything, and neither will your visitors!<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/managed-wordpress@2x-1024x731.png\" alt=\"Your WordPress website up-to-date thanks to Managed WordPress from Combell\" class=\"wp-image-12262\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/managed-wordpress@2x-1024x731.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/managed-wordpress@2x-300x214.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/managed-wordpress@2x-768x549.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/managed-wordpress@2x.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Your WordPress website up-to-date thanks to Managed WordPress from Combell<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/installing-updates-quickly-a-must-for-better-security\/\" rel=\"noreferrer noopener\" target=\"_blank\">Those updates are crucial for the security of your website.<\/a> Hackers eagerly exploit vulnerabilities and weaknesses discovered in outdated themes and plugins.<\/p>\n<p>But regular updates are also essential for your website's speed, especially concerning PHP, the foundational language on which WordPress is based.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Proactively backup your data<\/h3>\n<p>If your website gets hacked, your backups are your <strong>safety net.<\/strong> Consider them a preventive measure against potential hacks or other cyberattacks. Making a backup in advance or ensuring an automatic backup system means you can recover more quickly.<\/p>\n<p>Without backups, you risk losing data (such as files) or even rendering your systems completely unusable after a hack. That's pretty <strong>dire<\/strong>. Recovery time will be significantly longer, not to mention the extent of the damage.<\/p>\n<p>Knowing you have reliable backups provides peace of mind. \"Things can go wrong, but not everything is lost.\" That feeling is invaluable. Anyone aiming for professional business practices can't go without backups. That's why, here at Combell, we offer backups on shared hosting that go back up to <strong>fourteen days.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-07201764 uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Tip<\/p>\n<div class=\"uagb-notice-text\">\n<p>For those seeking the highest level of backup, we recommend <a href=\"https:\/\/www.combell.com\/en\/cloud-back-up\" target=\"_blank\" rel=\"noreferrer noopener\">cloud backup<\/a>. Consider it the ultimate insurance for your business. Our experts can provide you with all the details you need.<\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Find out what to do if your website has been hacked. Learn how to recover, secure your site and prevent future cyber attacks. Protect your online presence with practical steps and valuable insights.<\/p>\n","protected":false},"author":33,"featured_media":12264,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[62],"tags":[353,41,32],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small.jpg",1200,420,false],"thumbnail":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-50x50.jpg",50,50,true],"medium":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-300x105.jpg",300,105,true],"medium_large":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-768x269.jpg",768,269,true],"large":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-1024x358.jpg",1024,358,true],"1536x1536":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small.jpg",1200,420,false],"2048x2048":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small.jpg",1200,420,false],"post-featured":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-850x290.jpg",850,290,true],"post-featured-opt":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-750x256.jpg",750,256,true],"post-featured-opt-md":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-850x290.jpg",850,290,true],"post-featured-opt-sm":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-485x165.jpg",485,165,true],"post-featured-opt-xs":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-375x128.jpg",375,128,true],"post-most-popular":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-50x50.jpg",50,50,true],"post-author":["https:\/\/www.combell.com\/en\/blog\/files\/mijn-website-is-gehackt-wat-nu-header-small-60x60.jpg",60,60,true]},"uagb_author_info":{"display_name":"Amber","author_link":"https:\/\/www.combell.com\/en\/blog\/author\/amber\/"},"uagb_comment_info":0,"uagb_excerpt":"Find out what to do if your website has been hacked. Learn how to recover, secure your site and prevent future cyber attacks. Protect your online presence with practical steps and valuable insights.","_links":{"self":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12187"}],"collection":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=12187"}],"version-history":[{"count":14,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12187\/revisions"}],"predecessor-version":[{"id":12560,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12187\/revisions\/12560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media\/12264"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=12187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=12187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=12187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}