{"id":7729,"date":"2020-07-14T11:54:03","date_gmt":"2020-07-14T11:54:03","guid":{"rendered":"https:\/\/www.acmethemes.com\/blog\/?p=7729"},"modified":"2025-05-07T06:54:02","modified_gmt":"2025-05-07T06:54:02","slug":"what-to-do-when-your-wordpress-site-is-hacked","status":"publish","type":"post","link":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/","title":{"rendered":"What to do When Your WordPress Site is Hacked"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">We\u2019re always being reminded of the security risks we face every day when we go online. Whether we\u2019re making use of <\/span><a href=\"https:\/\/www.ringcentral.com\/voip-services.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">VoIP services<\/span><\/a><span style=\"font-weight: 400;\"> or we\u2019re simply trying to stay in touch with family and friends, there are constant threats to our privacy that we have to bear in mind. If you\u2019re running your own WordPress site, you must be aware that there\u2019s always the chance it could get hacked. But awareness is one thing; it\u2019s quite another knowing what to do in the event that it actually happens.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">With such a huge variety of WordPress sites &#8211; covering everything from <\/span><span style=\"font-weight: 400;\">office technologies<\/span><span style=\"font-weight: 400;\"> to <\/span><a href=\"https:\/\/www.appleworld.today\/blog\/2020\/6\/20\/20-ios-based-collaboration-tools-every-remote-team-needs\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">collaboration tools<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; there are a lot of potential targets for would-be hackers. And, indeed, more WordPress sites are getting hacked daily. So you need to ask yourself: what measures are you going to take if yours suffers the same fate? WordPress is the most hacked content management system (CMS) on the internet, so you have to be prepared. Of course, it\u2019s important to have robust security measures in place. But hackers are remarkably resourceful and can always find new loopholes and weaknesses to exploit.<\/span><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8930\" src=\"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2020\/07\/Hacking-1-1.jpg\" alt=\"\" width=\"820\" height=\"410\" \/><\/p>\r\n<p>&nbsp;<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span style=\"font-weight: 400;\">Moreover, being hacked can do potentially immense reputational damage, especially if you\u2019re trying to run an <\/span><a href=\"https:\/\/www.acmethemes.com\/themes\/online-shop\/\"><span style=\"font-weight: 400;\">online shop<\/span><\/a><span style=\"font-weight: 400;\">. If your <\/span><span style=\"font-weight: 400;\">landing page<\/span><span style=\"font-weight: 400;\"> gets hacked and used to promote other sites, sell illegal supplies, or simply redirect to another site, that can only do you harm in the eyes of customers. After all, consumers are a watchful and wary bunch &#8211; anything that suggests your website isn\u2019t reputable (even if it\u2019s no fault of your own) is likely to take a big toll on their confidence. This means they\u2019ll most likely take their custom elsewhere, costing you valuable revenue.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">So, let\u2019s say the worst has happened and your WordPress site has been hacked. What do you do next? Well, to help you get a better idea of what steps to take, we\u2019ve assembled this handy guide providing some top tips. Read on to find out more.<\/span><\/p>\r\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-6a0c4dc0228cd\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-6a0c4dc0228cd\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#Signs_your_WordPress_site_has_been_hacked\" >Signs your WordPress site has been hacked<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#How_to_Fix_a_Hacked_WordPress_Site\" >How to Fix a Hacked WordPress Site<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#Keep_Calm_and_Identify_the_Hack\" >Keep Calm and Identify the Hack<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#Get_in_Touch_with_Your_Hosting_Company\" >Get in Touch with Your Hosting Company<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#Restore_an_Older_Version_of_Your_Site_from_Backup\" >Restore an Older Version of Your Site from Backup<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#Scan_and_Remove_Malware\" >Scan and Remove Malware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#Check_User_Permissions_and_Change_Passwords\" >Check User Permissions and Change Passwords<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Signs_your_WordPress_site_has_been_hacked\"><\/span><span style=\"font-weight: 400;\">Signs your WordPress site has been hacked<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">Before we do anything else, it\u2019s worth listing some tell-tale signs that your WordPress site has been successfully breached by a hacker. It\u2019s not always immediately obvious (at least, not as obvious as you might think), so it\u2019s a good idea to be aware of the likely signs that your site has been hacked. Here are some giveaways to watch out for:<\/span><\/p>\r\n<ul>\r\n<li><b>You can\u2019t log in.<span style=\"font-weight: 400;\"> If you find that you can\u2019t log in to your WordPress site, it\u2019s possible that a hacker has gotten in and changed the password. But it could be, of course, that you\u2019ve just forgotten it (easy to do if you haven\u2019t had to enter it for a while). So, make sure it isn\u2019t just that! Try resetting your password and see if you can gain access to your account that way. If not, you may have been hacked.<\/span><\/b><\/li>\r\n<\/ul>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7732 aligncenter\" src=\"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2020\/07\/Signs-your-Wordpress-site-has-been-hacked.jpg\" alt=\"Signs-your-Wordpress-site-has-been-hacked\" width=\"820\" height=\"460\" \/><\/p>\r\n<ul>\r\n<li><b><b>Your site is redirecting elsewhere.<span style=\"font-weight: 400;\"> Hackers often redirect to their own sites once they\u2019ve gained access to other people\u2019s. If your WordPress site is redirecting people somewhere else or there are dubious links you haven\u2019t inserted, this may be a good indication that it has been hacked. Make sure you check with any other site administrators that they haven\u2019t made the changes themselves, however. <\/span><\/b><\/b><\/li>\r\n<li><strong>Your site looks different.<\/strong> <span style=\"font-weight: 400;\">If you find that your WordPress site suddenly looks completely different from how you left it, it may have been hacked. Again, if anyone else has administrator privileges for your website, then ask them about the changes before leaping to conclusions. It may be that they\u2019ve changed the design without telling you.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">Alternatively, your browser or Google may display a warning to advise you that your website might have been the subject of a security breach. You may also suddenly find that the site is running much slower than it would normally; this again might be an indication that a hacker has breached its security arrangements.<\/span><\/p>\r\n<h2><span class=\"ez-toc-section\" id=\"How_to_Fix_a_Hacked_WordPress_Site\"><\/span><span style=\"font-weight: 400;\">How to Fix a Hacked WordPress Site<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<p><span style=\"font-weight: 400;\">We\u2019ve heard a lot in recent years about the <\/span><a href=\"https:\/\/www.bigcommerce.com\/blog\/digital-transformation\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">digital transformation<\/span><\/a><span style=\"font-weight: 400;\"> that\u2019s been taking place all around us. We\u2019ve all seen for ourselves <a href=\"https:\/\/www.nextiva.com\/\">the rapid changes to the way we do business and communicate with one another<\/a> as a result. If anything, this makes it doubly frustrating when you do all the right things to reach a wider consumer base, only to find yourself undone by the malicious intentions of a hacker.<\/span><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7734 aligncenter\" src=\"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2020\/07\/wordpress-website-hacked.jpg\" alt=\"wordpress-website-hacked\" width=\"820\" height=\"511\" \/><\/p>\r\n<p><span style=\"font-weight: 400;\">But even if you are unlucky enough to have your site hacked, there\u2019s no need to panic right away. There are steps you can take to bring the situation under control and regain the upper hand over the hackers. Here\u2019s a concise, step-by-step run-through of what to do.<\/span><\/p>\r\n<h3><span class=\"ez-toc-section\" id=\"Keep_Calm_and_Identify_the_Hack\"><\/span><span style=\"font-weight: 400;\">Keep Calm and Identify the Hack<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p><span style=\"font-weight: 400;\">As we\u2019ve noted, the first thing you need to do is keep a cool head. It\u2019s easy to let your imagination run wild when you suspect you\u2019ve been hacked, but it won\u2019t help you in your efforts to get a grip on the situation. Even if your site has been hacked &#8211; and that\u2019s what you need to establish before doing anything else &#8211; that doesn\u2019t necessarily mean that everything is lost.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">So, the next thing you\u2019ll have to do is identify the nature of the hack and how it took place. Think about the points we\u2019ve already addressed about how to know when your site\u2019s been hacked. Can you log in? Is the site redirecting elsewhere? Does it look different? Are you receiving any warnings from Google or from your browser? Make a note of any relevant information, as you\u2019ll need it later on.<\/span><\/p>\r\n<h3><span class=\"ez-toc-section\" id=\"Get_in_Touch_with_Your_Hosting_Company\"><\/span><span style=\"font-weight: 400;\">Get in Touch with Your Hosting Company<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p><span style=\"font-weight: 400;\">Once you\u2019ve got more information on your suspected hack, the next thing you need to do is contact your hosting company. They\u2019ll be used to dealing with situations like this &#8211; don\u2019t forget, hacks are all too common &#8211; so you should find them to be very helpful and knowledgeable. Explain the situation to them and ask them for more information about any next steps you should take. They might ask you to <\/span><span style=\"font-weight: 400;\">share your screen online<\/span><span style=\"font-weight: 400;\">, so follow whatever instructions they give you.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">In cases where your website is hosted on a shared server, you should be able to establish whether the hacker has accessed your WordPress site via another site on the same server. Your hosting company should look into the matter for you, and from there, they should be able to provide you with information on how the breach came about. This may include where to find the backdoor to your site through which they gained access. Call them via their <\/span><span style=\"font-weight: 400;\">contact center solution<\/span><span style=\"font-weight: 400;\"> urgently if you suspect you\u2019ve been hacked.<\/span><\/p>\r\n<h3><span class=\"ez-toc-section\" id=\"Restore_an_Older_Version_of_Your_Site_from_Backup\"><\/span><span style=\"font-weight: 400;\">Restore an Older Version of Your Site from Backup<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p><span style=\"font-weight: 400;\">Any security expert worth their salt will tell you (probably until they\u2019re blue in the face) about the importance of making regular backups. These are vital because they could allow you to restore your site using an older version, from before your site was breached. In the event of a hack, this is likely to prove invaluable in helping you get everything back on track. If you don\u2019t have a backup you can use, then you might be able to manually remove the hack. This, though, is a time-consuming procedure, so making regular backups is hugely important.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Restoring from an old backup will mean that the entire site reverts back to that version. Any changes you\u2019ve made between the time you created the backup and when your site was hacked will be lost. This is why it\u2019s so important to create backups at regular intervals, so you can minimize any disruption should you have to restore your site after a hack. Restoring your site doesn\u2019t eliminate the vulnerabilities that the hackers exploited, so once you\u2019ve completed the restoration, you\u2019ll need to beef up your security measures.<\/span><\/p>\r\n<h3><span class=\"ez-toc-section\" id=\"Scan_and_Remove_Malware\"><\/span><span style=\"font-weight: 400;\">Scan and Remove Malware<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p><span style=\"font-weight: 400;\">Outdated files can provide hackers with relatively easy access to a website. Once they\u2019ve gained that access, they can create a backdoor (allowing them to bypass normal authentication), which they can then continue to exploit in the future. The most effective way of preventing hackers from gaining access to your site in this way is simply to keep your files properly up to date. Make sure you regularly delete any inactive or outdated <\/span><span style=\"font-weight: 400;\">WordPress themes<\/span><span style=\"font-weight: 400;\"> and plugins; this will provide hackers with less of an opportunity.<\/span><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7733 aligncenter\" src=\"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2020\/07\/Scan-and-remove-malware-from-wordpress-site.png\" alt=\"Scan-and-remove-malware-from-wordpress-site\" width=\"820\" height=\"410\" \/><\/p>\r\n<h3><span class=\"ez-toc-section\" id=\"Check_User_Permissions_and_Change_Passwords\"><\/span><span style=\"font-weight: 400;\">Check User Permissions and Change Passwords<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<p><span style=\"font-weight: 400;\">Once you\u2019ve regained control of your site, restored it, and cleared it of any malware, you need to check exactly who has access to it. Make sure that only people who need administrator privileges have them. Change all passwords and security keys associated with your site. Ensure that any <\/span><a href=\"https:\/\/www.networkcomputing.com\/network-security\/6-components-secure-video-conferencing-infrastructure-when-working-remotely\" target=\"_blank\" rel=\"noopener noreferrer nofollow\"><span style=\"font-weight: 400;\">video conferencing security<\/span><\/a><span style=\"font-weight: 400;\"> arrangements are robust so that communications between you and any other administrators are kept safe and confidential.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">You\u2019ll also want to make sure that when choosing new passwords, they\u2019re suitably strong and robust. A password generator should help you come up with a combination that\u2019s strong enough to bamboozle any would-be hackers.<\/span><\/p>\r\n\r\n<p>(This is a guest post contribution from John Allen of RingCentral US.)<\/p>\r\n\r\n\r\n\r\n<blockquote class=\"wp-block-quote is-style-large is-layout-flow wp-block-quote-is-layout-flow\">\r\n<p><strong>Bio:<\/strong> <strong>John Allen &#8211; RingCentral US<\/strong> <br \/>John Allen is the Director and Global SEO at RingCentral, a global UCaaS, VoIP and<a href=\"http:\/\/www.ringcentral.com\/online-meetings\/teleconference.html\" target=\"_blank\" rel=\"noreferrer noopener sponsored nofollow\" aria-label=\"undefined (opens in a new tab)\"> teleconference services<\/a> provider. He has over 14 years of experience and an extensive background in building and optimizing digital marketing programs. He has written for websites such as Hubspot and Toolbox.<\/p>\r\n<\/blockquote>\r\n","protected":false},"excerpt":{"rendered":"<p>More WordPress sites are getting hacked daily. So you need to ask yourself: what measures are you going to take if yours suffers the same fate?<\/p>\n","protected":false},"author":1,"featured_media":7744,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[49],"tags":[175,47],"class_list":["post-7729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wordpress-tips","tag-wordpress-hacks","tag-wordpress-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What to do When Your WordPress Site is Hacked &#171; Acme Themes Blog<\/title>\n<meta name=\"description\" content=\"What to do When Your WordPress Site is Hacked. it\u2019s important to have robust security measures in place. But hackers are remarkably\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do When Your WordPress Site is Hacked &#171; Acme Themes Blog\" \/>\n<meta property=\"og:description\" content=\"What to do When Your WordPress Site is Hacked. it\u2019s important to have robust security measures in place. But hackers are remarkably\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Acme Themes Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/acmethemes\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-14T11:54:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-07T06:54:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2020\/07\/What-to-Do-if-Your-WordPress-is-Hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Acme Themes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@acme_themes\" \/>\n<meta name=\"twitter:site\" content=\"@acme_themes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Acme Themes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/\"},\"author\":{\"name\":\"Acme Themes\",\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/#\\\/schema\\\/person\\\/a183debef87250cd8412b17cfd5c5a03\"},\"headline\":\"What to do When Your WordPress Site is Hacked\",\"datePublished\":\"2020-07-14T11:54:03+00:00\",\"dateModified\":\"2025-05-07T06:54:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/\"},\"wordCount\":1644,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/What-to-Do-if-Your-WordPress-is-Hacked.jpg\",\"keywords\":[\"wordpress hacks\",\"WordPress Tips\"],\"articleSection\":[\"WordPress Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/\",\"url\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/\",\"name\":\"What to do When Your WordPress Site is Hacked &#171; Acme Themes Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/What-to-Do-if-Your-WordPress-is-Hacked.jpg\",\"datePublished\":\"2020-07-14T11:54:03+00:00\",\"dateModified\":\"2025-05-07T06:54:02+00:00\",\"description\":\"What to do When Your WordPress Site is Hacked. it\u2019s important to have robust security measures in place. But hackers are remarkably\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/What-to-Do-if-Your-WordPress-is-Hacked.jpg\",\"contentUrl\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/What-to-Do-if-Your-WordPress-is-Hacked.jpg\",\"width\":1170,\"height\":500,\"caption\":\"What-to-Do-if-Your-WordPress-is-Hacked\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/what-to-do-when-your-wordpress-site-is-hacked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to do When Your WordPress Site is Hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/\",\"name\":\"Acme Themes Blog\",\"description\":\"WordPress Themes and Plugins, WordPress Tips and Tricks, News and Events\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/#organization\",\"name\":\"Acme Themes\",\"url\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/acmelogo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/acmelogo.jpg\",\"width\":3600,\"height\":1800,\"caption\":\"Acme Themes\"},\"image\":{\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/acmethemes\\\/\",\"https:\\\/\\\/x.com\\\/acme_themes\",\"https:\\\/\\\/www.instagram.com\\\/acmethemes\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/acmethemes\",\"https:\\\/\\\/myspace.com\\\/acmethemes\",\"https:\\\/\\\/www.pinterest.com\\\/acmethemes\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/AcmeThemes\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/User:AcmeThemes\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/#\\\/schema\\\/person\\\/a183debef87250cd8412b17cfd5c5a03\",\"name\":\"Acme Themes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/648bc894290f2d11cf2348dd50014c0cf715a434282801b0a72dd7fa49f13d73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/648bc894290f2d11cf2348dd50014c0cf715a434282801b0a72dd7fa49f13d73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/648bc894290f2d11cf2348dd50014c0cf715a434282801b0a72dd7fa49f13d73?s=96&d=mm&r=g\",\"caption\":\"Acme Themes\"},\"url\":\"https:\\\/\\\/www.acmethemes.com\\\/blog\\\/author\\\/acmeblogadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to do When Your WordPress Site is Hacked &#171; Acme Themes Blog","description":"What to do When Your WordPress Site is Hacked. it\u2019s important to have robust security measures in place. But hackers are remarkably","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/","og_locale":"en_US","og_type":"article","og_title":"What to do When Your WordPress Site is Hacked &#171; Acme Themes Blog","og_description":"What to do When Your WordPress Site is Hacked. it\u2019s important to have robust security measures in place. But hackers are remarkably","og_url":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/","og_site_name":"Acme Themes Blog","article_publisher":"https:\/\/www.facebook.com\/acmethemes\/","article_published_time":"2020-07-14T11:54:03+00:00","article_modified_time":"2025-05-07T06:54:02+00:00","og_image":[{"width":1170,"height":500,"url":"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2020\/07\/What-to-Do-if-Your-WordPress-is-Hacked.jpg","type":"image\/jpeg"}],"author":"Acme Themes","twitter_card":"summary_large_image","twitter_creator":"@acme_themes","twitter_site":"@acme_themes","twitter_misc":{"Written by":"Acme Themes","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#article","isPartOf":{"@id":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/"},"author":{"name":"Acme Themes","@id":"https:\/\/www.acmethemes.com\/blog\/#\/schema\/person\/a183debef87250cd8412b17cfd5c5a03"},"headline":"What to do When Your WordPress Site is Hacked","datePublished":"2020-07-14T11:54:03+00:00","dateModified":"2025-05-07T06:54:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/"},"wordCount":1644,"commentCount":0,"publisher":{"@id":"https:\/\/www.acmethemes.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2020\/07\/What-to-Do-if-Your-WordPress-is-Hacked.jpg","keywords":["wordpress hacks","WordPress Tips"],"articleSection":["WordPress Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/","url":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/","name":"What to do When Your WordPress Site is Hacked &#171; Acme Themes Blog","isPartOf":{"@id":"https:\/\/www.acmethemes.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2020\/07\/What-to-Do-if-Your-WordPress-is-Hacked.jpg","datePublished":"2020-07-14T11:54:03+00:00","dateModified":"2025-05-07T06:54:02+00:00","description":"What to do When Your WordPress Site is Hacked. it\u2019s important to have robust security measures in place. But hackers are remarkably","breadcrumb":{"@id":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#primaryimage","url":"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2020\/07\/What-to-Do-if-Your-WordPress-is-Hacked.jpg","contentUrl":"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2020\/07\/What-to-Do-if-Your-WordPress-is-Hacked.jpg","width":1170,"height":500,"caption":"What-to-Do-if-Your-WordPress-is-Hacked"},{"@type":"BreadcrumbList","@id":"https:\/\/www.acmethemes.com\/blog\/what-to-do-when-your-wordpress-site-is-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.acmethemes.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What to do When Your WordPress Site is Hacked"}]},{"@type":"WebSite","@id":"https:\/\/www.acmethemes.com\/blog\/#website","url":"https:\/\/www.acmethemes.com\/blog\/","name":"Acme Themes Blog","description":"WordPress Themes and Plugins, WordPress Tips and Tricks, News and Events","publisher":{"@id":"https:\/\/www.acmethemes.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.acmethemes.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.acmethemes.com\/blog\/#organization","name":"Acme Themes","url":"https:\/\/www.acmethemes.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.acmethemes.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2016\/12\/acmelogo.jpg","contentUrl":"https:\/\/www.acmethemes.com\/blog\/wp-content\/uploads\/2016\/12\/acmelogo.jpg","width":3600,"height":1800,"caption":"Acme Themes"},"image":{"@id":"https:\/\/www.acmethemes.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/acmethemes\/","https:\/\/x.com\/acme_themes","https:\/\/www.instagram.com\/acmethemes\/","https:\/\/www.linkedin.com\/in\/acmethemes","https:\/\/myspace.com\/acmethemes","https:\/\/www.pinterest.com\/acmethemes\/","https:\/\/www.youtube.com\/c\/AcmeThemes","https:\/\/en.wikipedia.org\/wiki\/User:AcmeThemes"]},{"@type":"Person","@id":"https:\/\/www.acmethemes.com\/blog\/#\/schema\/person\/a183debef87250cd8412b17cfd5c5a03","name":"Acme Themes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/648bc894290f2d11cf2348dd50014c0cf715a434282801b0a72dd7fa49f13d73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/648bc894290f2d11cf2348dd50014c0cf715a434282801b0a72dd7fa49f13d73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/648bc894290f2d11cf2348dd50014c0cf715a434282801b0a72dd7fa49f13d73?s=96&d=mm&r=g","caption":"Acme Themes"},"url":"https:\/\/www.acmethemes.com\/blog\/author\/acmeblogadmin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/posts\/7729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/comments?post=7729"}],"version-history":[{"count":18,"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/posts\/7729\/revisions"}],"predecessor-version":[{"id":12345,"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/posts\/7729\/revisions\/12345"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/media\/7744"}],"wp:attachment":[{"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/media?parent=7729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/categories?post=7729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.acmethemes.com\/blog\/wp-json\/wp\/v2\/tags?post=7729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}