{"id":63556,"date":"2020-09-04T18:14:05","date_gmt":"2020-09-04T18:14:05","guid":{"rendered":"https:\/\/rockcontent.com\/blog\/wordpress-hacked\/"},"modified":"2025-09-09T15:51:04","modified_gmt":"2025-09-09T18:51:04","slug":"wordpress-hacked","status":"publish","type":"post","link":"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/","title":{"rendered":"Check out what to do to remove malware and clean a hacked WordPress"},"content":{"rendered":"<p>Before we start talking about how a <a href=\"https:\/\/pingback.com\/en\/resources\/wordpress\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"WordPress site (opens in a new tab)\">WordPress site<\/a> is hacked, let&#8217;s remember an important fact: a website is the main channel for acquiring business opportunities on the Internet, as we always say here at Rock Content.<\/p>\n<p>We also emphasize that it is necessary to choose a CMS, being WordPress the most recommended because of its operational simplicity and functions focused on generating results and providing <a href=\"https:\/\/pingback.com\/en\/resources\/website-security\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"security (opens in a new tab)\">security<\/a>.<\/p>\n<p>So, think about your well-developed site, conquering more and more Google positions and even <a href=\"https:\/\/pingback.com\/en\/resources\/blog-conversion-rates\/\" rel=\"noreferrer noopener\" target=\"_blank\">converting<\/a> visitors into leads or customers. <\/p>\n<p>This is the scenario that all companies seek to achieve, right? But, what if you suddenly find out that the worst has happened? Your site was hacked!<\/p>\n<p>Whoever has been through this knows how hard it is. If you have never experienced it, imagine the following situation: someone breaks into your physical store and loots it. Terrible, isn&#8217;t it? <\/p>\n<p>Right, that&#8217;s what could happen to your online business once a hacker invades it. Maybe your site gets slower, maybe some data is lost, or maybe all the files are stolen!<\/p>\n<p>To instruct you on what to do in front of a situation like this and help you avoid this from happening, we have decided to write this article. We will discuss the issues below:<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"#how\">How to know if my WordPress site was hacked?<\/a><\/li>\n<li><a href=\"#solve\">How to solve a hacked WordPress site?<\/a><\/li>\n<li><a href=\"#prevent\">How to prevent my site from being hacked?<\/a><\/li>\n<\/ul>\n<p>Keep reading!<\/p>\n<p><a id=\"how\"><\/a><\/p>\n<h2 class=\"wp-block-heading\"><strong>How to know if my WordPress site was hacked?<\/strong><\/h2>\n<p>When a WordPress site is invaded, its administrator certainly goes through a lot of headaches. After all, the longer the site remains hacked, the more opportunities from possible new sales you will lose.<\/p>\n<p>However, it is necessary to stay calm at this point and try to figure out the source of the hack. This is essential if we are to find the solution. After all, there is no way to build a solution without knowing beforehand how the problem came about, isn&#8217;t it true?<\/p>\n<p>To do that, try to answer the following questions:<\/p>\n<ul class=\"wp-block-list\">\n<li>Are your wp-admin login and password not working?<\/li>\n<li>Is your site redirecting to another (that has nothing to do with yours)?<\/li>\n<li>Does <a rel=\"noreferrer noopener\" href=\"https:\/\/pingback.com\/en\/resources\/add-google-analytics-to-wordpress\/\" target=\"_blank\">Google Analytics<\/a> show access to unfamiliar content created on your website (most of it in other languages like Chinese)?<\/li>\n<li>Does Google Search Console point to your site as insecure?<\/li>\n<\/ul>\n<p>If the answer to one or, in a worst-case scenario, all these questions is &#8220;yes&#8221;, it is a strong indication that your site was hacked. It is important to know this because, when contacting your <a href=\"https:\/\/pingback.com\/en\/resources\/wordpress-hosting\/\" rel=\"noreferrer noopener\" target=\"_blank\">hosting server<\/a>, such information must be passed on.<\/p>\n<p>What are the reasons that make a WordPress site hacked?<\/p>\n<p>There are four points that justify what may have caused the invasion of a WordPress site.<\/p>\n<\/p>\n<h3 class=\"wp-block-heading\"><strong>1. Easy identification<\/strong><\/h3>\n<p>WordPress is one of the most used <a href=\"https:\/\/pingback.com\/en\/resources\/cms-for-marketing\/\" rel=\"noreferrer noopener\" target=\"_blank\">CMS<\/a> in the world, besides being easy to identify if a site is built on the platform.<\/p>\n<p>Do you want to know how? Just access any site in Google Chrome, click on the three dots on the top right, choose &#8220;More Tools&#8221; and then &#8220;Developer Tools&#8221;.<\/p>\n<p>If the site&#8217;s <a rel=\"noreferrer noopener\" href=\"https:\/\/pingback.com\/en\/resources\/change-wordpress-url\/\" target=\"_blank\">URL<\/a> contains &#8220;wp-content&#8221;, it&#8217;s built on WordPress, and this can make it a potential &#8220;victim&#8221; if the proper precautions \u2015 which we&#8217;ll talk about later \u2015 are not taken.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img data-opt-id=1730170708  data-opt-src=\"https:\/\/s3.amazonaws.com\/scribblelive-com-prod\/wp-content\/uploads\/sites\/4\/2020\/09\/image6.png\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"wp-content on developer tools at Chrome\" class=\"wp-image-15645\"\/><\/figure>\n<\/div>\n<h3 class=\"wp-block-heading\"><strong>2. Open-source<\/strong><\/h3>\n<p>The fact that WordPress is an open-source platform is very advantageous because it allows you to embed functionalities that meet your needs, such as <a href=\"https:\/\/pingback.com\/en\/resources\/seo-plugins\/\" rel=\"noreferrer noopener\" target=\"_blank\">plugins<\/a> and widgets.<\/p>\n<p>However, having the code change to anyone gives room to loopholes that are used by hackers to invade your site.<\/p>\n<p>Sometimes it almost feels like playing a game of cat-and-mouse with vulnerabilities. When developers fix one loophole, another one may pop up elsewhere, especially if plugins or themes you\u2019re using aren\u2019t regularly maintained. This isn\u2019t exclusive to WordPress\u2014the popularity just makes it a bigger target. Hackers love poking at what a lot of people use because the reward is higher.<\/p>\n<p>If you\u2019re relying on a bunch of custom features or have a sprawling set of plugins from all over the web, it gets even riskier. Not every plugin author does proper security patches or notifications, and most site owners just cross their fingers that updates don\u2019t break anything critical. In 2025, these risks haven\u2019t gone away, although the WordPress community is steadily getting better at pushing security alerts (when people bother to read them, anyway).<\/p>\n<h3 class=\"wp-block-heading\"><strong>3. <a href=\"https:\/\/pingback.com\/en\/resources\/free-wordpress-themes\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Theme (opens in a new tab)\">Theme<\/a> and plugins<\/strong><\/h3>\n<p>Anyone who knows programming can create a <a href=\"https:\/\/pingback.com\/en\/resources\/best-wordpress-plugins\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"plugin (opens in a new tab)\">plugin<\/a> and make it available on WordPress. Therefore, we stress the importance of installing only plugins that come from reliable sources. Some programs are created with the purpose of opening the path for invasion.&nbsp;<\/p>\n<h3 class=\"wp-block-heading\"><strong>4. Manual updates<\/strong><\/h3>\n<p>WordPress, as well as its <a href=\"https:\/\/pingback.com\/en\/resources\/free-wordpress-themes\/\" rel=\"noreferrer noopener\" target=\"_blank\">themes<\/a> and plugins, may not automatically perform updates, forcing the user to do it manually.<\/p>\n<p>If your site does not receive the <a href=\"https:\/\/pingback.com\/en\/resources\/how-to-update-php-in-wordpress\/\" rel=\"noreferrer noopener\" target=\"_blank\">updates<\/a>, it may become vulnerable to hacker attacks.<\/p>\n<h3 class=\"wp-block-heading\"><strong>How to identify infected files?<\/strong><\/h3>\n<p>Assuming your site has many files \u2014 including images, text, videos etc. \u2014 how do you know which ones have been infected by the malware? There are two ways to do so: checking the date and the log.<\/p>\n<p>The data-check refers to looking at the history of your website when new files were added or modified.<\/p>\n<p>For example: if the website was working normally on the 5th and you didn&#8217;t publish any files before the 10th, but on the 7th, some files were added or modified,<strong> it means that the invasion certainly happened on that day.<\/strong><\/p>\n<p>Another way to do this is through the log. It will pinpoint where the attack came from by identifying which IP was used to invade your site and make changes to it.<\/p>\n<p>By knowing which path was taken, it becomes possible not only to restore the site, but also to protect it from future invasions coming from that same source.<\/p>\n<p><a id=\"solve\"><\/a><\/p>\n<h2 class=\"wp-block-heading\"><strong>How to solve a hacked WordPress site?<\/strong><\/h2>\n<p>Now that you know how a WordPress site can be invaded, let&#8217;s see what should you do if it happens to you.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Contact the hosting company<\/strong><\/h3>\n<p>Most companies that offer <a href=\"https:\/\/pingback.com\/en\/resources\/how-to-choose-a-web-host\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"website hosting services (opens in a new tab)\">website hosting services<\/a> are prepared to deal with such situations. After all, those who operate this type of service need to have a thorough knowledge of the subject so that they can help you solve such a serious problem.<\/p>\n<p>Moreover, if your hosting is shared \u2014 that is, shared with other users who use the same server \u2014<strong> the hack may also affect the other sites that use the same service.<\/strong><\/p>\n<p>For this reason, the customer support should be able to point out the origin of the invasion and, if necessary, to quarantine your site to avoid it from causing damage to the server and its users.<\/p>\n<p>This kind of technical assistance is usually performed by chat or email. Many companies restrict themselves to inform the hack, being up to the client to solve the problem on their own, which can complicate the resolution.<\/p>\n<p>That is why in <a rel=\"noreferrer noopener\" href=\"https:\/\/pingback.com\/en\/resources\/hub-wordpress\/\" target=\"_blank\">Stage<\/a> \u2014 <strong>a solution that Rock Content developed for creating WordPress sites focused on results<\/strong> \u2014 the support is dedicated not only to identify the root of the problem, but also to guide customers on how to solve it.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Create a backup<\/strong><\/h3>\n<p>The backup is something that should happen on a daily, weekly, or two-weekly basis to preserve all the structure and contents of your site.<\/p>\n<p>It is essential <a href=\"https:\/\/pingback.com\/en\/resources\/blog-conversion-rates\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"for blogs (opens in a new tab)\">for blogs<\/a> that post a lot of content, because have you ever imagined what a pity it would be to write articles that take so much work to simply lose them after the recovery of a backup?<\/p>\n<p>So, when hiring a hosting server, remember to ask how often the backup is performed (in Rock Stage, for example, it&#8217;s weekly). You can also count on the help of backup plugins on WordPress to go back to the recovery point before the hack happened.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Restore the backup<\/strong><\/h3>\n<p>Once you have built the backup, the next step is to restore it. We reinforce the alert that your site may have been hacked before you created the backup, that is, you will lose all posts, changes, and modifications made before the invasion.<\/p>\n<p>If you have chosen to restore the backup via contact with the hosting server (which is the most recommended), the support team can do so, and <strong>your site will return to the settings it had prior to the hack.<\/strong><\/p>\n<p>Therefore, we suggest that you save your site&#8217;s textual content also externally \u2014 as in Google Drive \u2014 so that they are posted again if such a situation occurs.<\/p>\n<p>After the restore is done, observe how your site performs and if the errors it was displaying are gone.<\/p>\n<p>After all, in the same way that you can publish blog posts with retroactive date, hackers can also manipulate the date a file was modified. So the importance of making sure everything is ok.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Change your login and password<\/strong><\/h3>\n<p>After following the steps above, it is also highly recommended that you change your login and password, especially if you have not been able to identify how the hacker has managed to break into your site.<\/p>\n<p>For this reason, WordPress points out when a password is weak, medium, or strong, and you <strong>should always choose strong ones. <\/strong><\/p>\n<p>After all, some of these invasions occur after the hacker has programmed a bot to make several access attempts, making weak password sites more vulnerable to attacks.<\/p>\n<p><a id=\"prevent\"><\/a><\/p>\n<h2 class=\"wp-block-heading\"><strong>How to prevent my site from being hacked?<\/strong><\/h2>\n<p>If your site has never been hacked, this is great! However, that does not mean that you should be less careful. It can really happen to anyone. So, follow the steps below to improve the <a href=\"https:\/\/pingback.com\/en\/resources\/hosting-security\/\" rel=\"noreferrer noopener\" target=\"_blank\">security<\/a> of your website.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Keep your WordPress site updated<\/strong><\/h3>\n<p>One of the safest processes on WordPress is to keep it always up to date; this applies to the CMS, themes, and plugins.<\/p>\n<p>When a WordPress update is required, a message appears on your dashboard&#8217;s home screen. Since this is the screen you see every time you log in to the platform, you will certainly not forget to update it.<\/p>\n<p>When it comes to the themes and plugins, you will probably need to check one by one in most cases. For this, just access<strong> &#8220;Appearance \/ Themes&#8221; or &#8220;Plugins \/ Installed Plugins&#8221;<\/strong> to check if you need to update any of them.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img data-opt-id=798087089  decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/t8UIoUxSaVIemsuyS1BrbcbO6CRSc2O0XzOIId2fg6cjk_vT-rCmqH4gTqFlg2kcBBHFoqWAVLAtM9uElNbBacpBwvZZtuqS9pyVqb90jPalqwYY2AjXKnNfY0iCA39zDfQzvoy7\" alt=\"site wordpress hackeado\"\/><\/figure>\n<\/div>\n<p>To give you an idea, around 35% of WordPress installations are outdated, so it&#8217;s important to check \u2014 even once a week \u2014 that all features are working properly.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Get an SSL certificate<\/strong><\/h3>\n<p>The SSL certificate is used to transform non-secure (HTTP-initiated) sites into secure (whose URLs start with HTTPS). Currently, most servers offer this certificate for free, you just need to request it.<\/p>\n<p>This is essential not only for visitors to know that your domain is secure, but also because virtual security is one of the <strong>criteria Google takes into account to position your site in <\/strong><a href=\"https:\/\/pingback.com\/en\/resources\/seo-web-design\/\" rel=\"noreferrer noopener\" target=\"_blank\"><strong>search results<\/strong><\/a><strong>.<\/strong><\/p>\n<h3 class=\"wp-block-heading\"><strong>Ensure that your system monitors firewalls<\/strong><\/h3>\n<p>The firewall is a device whose purpose is to assign security to your site by controlling data traffic, allowing the transmission only of those who are authorized. Therefore, make sure that the hosting server provides this function.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Give preference to the WordPress platform<\/strong><\/h3>\n<p>Although said that the CMS has security holes, they occur if you do not do what we have pointed out throughout this post: install the updates, do not get themes and plugins from questionable sources, among others.<\/p>\n<p>After all, WordPress is one of the most secure platforms there is, starting with security features such as Really Simple SSL.<\/p>\n<h3 class=\"wp-block-heading\"><strong>Count on two-factor authentication<\/strong><\/h3>\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/pingback.com\/en\/resources\/two-factor-authentication\/\" target=\"_blank\">Two-factor authentication<\/a> is a process that makes your site login stronger. Through it, besides having to enter your username and password, it is also necessary to authenticate your entry via application, token, magnetic card, SMS, or email.<\/p>\n<p>Of course, this makes the login process take longer, but on the other hand, it increases your website&#8217;s connection security, making any kind of invasion extremely unlikely to happen.<\/p>\n<p>By following these tips, the chances of having your WordPress site hacked decrease dramatically. So, you can <strong>focus your attention on managing your digital strategies based on it.<\/strong><\/p>\n<p>WordPress is the most widely-used content management system (CMS) in the world. Creating a blog on the platform is the perfect way to structure and optimize your digital strategy. <a href=\"https:\/\/resources.rockcontent.com\/wordpress-guide\" rel=\"noreferrer noopener\" target=\"_blank\">Check out this WordPress guide for corporate blogs and learn more!<\/a><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/resources.rockcontent.com\/wordpress-guide\" target=\"_blank\" rel=\"noreferrer noopener\"><img data-opt-id=466833331  data-opt-src=\"https:\/\/s3.amazonaws.com\/scribblelive-com-prod\/wp-content\/uploads\/2020\/08\/Materiais_750x200-banner-final.png\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"WordPress Guide for Corporate Blogs - Promotional Banner\" class=\"wp-image-13563\"><\/a><\/figure>\n<\/div>\n<p> }}<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever wondered what it must be like to have your WordPress site hacked? This is a frightening situation that can occur with anyone. If it does happen to you, it is essential to know what to do to solve the problem and make sure it does not happen again.<\/p>\n","protected":false},"author":1,"featured_media":56547,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-63556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WordPress hacked: how to remove malware and fix your page<\/title>\n<meta name=\"description\" content=\"Is your WordPress hacked? Learn step-by-step what to do if you are in such a situation and how to prevent it from happening!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WordPress hacked: how to remove malware and fix your page\" \/>\n<meta property=\"og:description\" content=\"Is your WordPress hacked? Learn step-by-step what to do if you are in such a situation and how to prevent it from happening!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Pingback\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-04T18:14:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T18:51:04+00:00\" \/>\n<meta name=\"author\" content=\"Carolina\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carolina\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/\",\"url\":\"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/\",\"name\":\"WordPress hacked: how to remove malware and fix your page\",\"isPartOf\":{\"@id\":\"https:\/\/pingback.com\/en\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2020-09-04T18:14:05+00:00\",\"dateModified\":\"2025-09-09T18:51:04+00:00\",\"author\":{\"@id\":\"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/5931a4533700c840b9f38199581abc33\"},\"description\":\"Is your WordPress hacked? Learn step-by-step what to do if you are in such a situation and how to prevent it from happening!\",\"breadcrumb\":{\"@id\":\"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/pingback.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Check out what to do to remove malware and clean a hacked WordPress\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/#website\",\"url\":\"https:\/\/pingback.com\/en\/resources\/\",\"name\":\"Pingback\",\"description\":\"Marketing for builders\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pingback.com\/en\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/5931a4533700c840b9f38199581abc33\",\"name\":\"Carolina\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/70cde532238b4f8bf4a6e7e589ff0a259eda38fa966564ca7ed7d23e61c27774?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/70cde532238b4f8bf4a6e7e589ff0a259eda38fa966564ca7ed7d23e61c27774?s=96&d=mm&r=g\",\"caption\":\"Carolina\"},\"sameAs\":[\"https:\/\/pingback.com\"],\"url\":\"https:\/\/pingback.com\/en\/resources\/author\/adm1n\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WordPress hacked: how to remove malware and fix your page","description":"Is your WordPress hacked? Learn step-by-step what to do if you are in such a situation and how to prevent it from happening!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/","og_locale":"pt_BR","og_type":"article","og_title":"WordPress hacked: how to remove malware and fix your page","og_description":"Is your WordPress hacked? Learn step-by-step what to do if you are in such a situation and how to prevent it from happening!","og_url":"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/","og_site_name":"Pingback","article_published_time":"2020-09-04T18:14:05+00:00","article_modified_time":"2025-09-09T18:51:04+00:00","author":"Carolina","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Carolina","Est. tempo de leitura":"10 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/","url":"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/","name":"WordPress hacked: how to remove malware and fix your page","isPartOf":{"@id":"https:\/\/pingback.com\/en\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/#primaryimage"},"image":{"@id":"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/#primaryimage"},"thumbnailUrl":"","datePublished":"2020-09-04T18:14:05+00:00","dateModified":"2025-09-09T18:51:04+00:00","author":{"@id":"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/5931a4533700c840b9f38199581abc33"},"description":"Is your WordPress hacked? Learn step-by-step what to do if you are in such a situation and how to prevent it from happening!","breadcrumb":{"@id":"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/pingback.com\/en\/resources\/wordpress-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/pingback.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Check out what to do to remove malware and clean a hacked WordPress"}]},{"@type":"WebSite","@id":"https:\/\/pingback.com\/en\/resources\/#website","url":"https:\/\/pingback.com\/en\/resources\/","name":"Pingback","description":"Marketing for builders","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pingback.com\/en\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/5931a4533700c840b9f38199581abc33","name":"Carolina","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/pingback.com\/en\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/70cde532238b4f8bf4a6e7e589ff0a259eda38fa966564ca7ed7d23e61c27774?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/70cde532238b4f8bf4a6e7e589ff0a259eda38fa966564ca7ed7d23e61c27774?s=96&d=mm&r=g","caption":"Carolina"},"sameAs":["https:\/\/pingback.com"],"url":"https:\/\/pingback.com\/en\/resources\/author\/adm1n\/"}]}},"_links":{"self":[{"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/posts\/63556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/comments?post=63556"}],"version-history":[{"count":3,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/posts\/63556\/revisions"}],"predecessor-version":[{"id":127596,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/posts\/63556\/revisions\/127596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/media?parent=63556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/categories?post=63556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pingback.com\/en\/resources\/wp-json\/wp\/v2\/tags?post=63556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}