Skip to content

Latest commit

 

History

History
executable file
·
34 lines (29 loc) · 1.28 KB

File metadata and controls

executable file
·
34 lines (29 loc) · 1.28 KB
layout post
title Assess spam damage
date 2015-01-01
updated 2022-03-04
description Find out what to do if your site has been hacked to host spam.
tags
security

This step is for sites hacked to host spam, often with the warning "This site may be hacked" displayed in search results. It's one of the longest steps in the recovery process. In this step, you'll compile a list of the damaged files on your site. You'll use this list in a later step, Clean and maintain your site.

{% Aside %} If your site was affected by malware and is flagged with the warning "This site may harm your computer" in search results, see the corresponding article, Assess malware damage (Hacked with malware). {% endAside %}

{% YouTube "lG5lOix9b9k" %}

Because certain hacking campaigns affect hundreds and thousands of sites in similar ways, they can be cleaned up using a set of specific steps. If any of these hacking campaigns describe the hack on your site, click through to read the guide.