{"id":5399,"date":"2026-02-22T09:00:07","date_gmt":"2026-02-21T23:00:07","guid":{"rendered":"https:\/\/www.e-cbd.com.au\/blog\/?p=5399"},"modified":"2026-02-24T02:25:35","modified_gmt":"2026-02-23T16:25:35","slug":"what-to-do-when-your-website-has-been-hacked","status":"publish","type":"post","link":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/","title":{"rendered":"What To Do When Your Website Has Been Hacked"},"content":{"rendered":"<p>Found a hack or malware on your website? Don&#8217;t panic, here is our simple step-by-step guide for dealing with a hacked website.<\/p>\n<p>No website is completely immune to attacks and sites are hacked every day.<\/p>\n<p>This guide will walk you through the immediate actions you need to take.<\/p>\n<h2 id=\"key-takeaways\">Key takeaways<\/h2>\n<ul>\n<li><strong>Stay calm and act methodically<\/strong> \u2014 rushed actions can worsen the damage or destroy evidence you need for cleanup. :contentReference[oaicite:0]{index=0}<\/li>\n<li><strong>Confirm the hack first<\/strong> by checking common signs like pop-ups, unexpected layout changes, login issues, browser warnings, host alerts, and Search Console notifications. :contentReference[oaicite:1]{index=1}<\/li>\n<li><strong>Move quickly to limit damage<\/strong>: isolate the site if needed, secure access, and prevent the attacker from continuing to use your site. :contentReference[oaicite:2]{index=2}<\/li>\n<li><strong>Look for hidden access<\/strong> such as suspicious admin users and unknown changes \u2014 hackers often create backdoors to regain entry. :contentReference[oaicite:3]{index=3}<\/li>\n<li><strong>Expect SEO impact<\/strong> (traffic drops, hacked pages indexed, warnings) and plan to clean up both the infection and the search footprint. :contentReference[oaicite:4]{index=4}<\/li>\n<li><strong>Recovery isn\u2019t just cleanup<\/strong>: you need hardening (updates, passwords, monitoring, backups) to reduce reinfection risk. :contentReference[oaicite:5]{index=5}<\/li>\n<\/ul>\n<h3><strong>I. Immediate Actions to Take if Your Website Has Been Hacked<\/strong><\/h3>\n<p>We need to act quickly but don&#8217;t rush.<\/p>\n<p>These immediate steps will help you take control of the situation and minimise the damage.<\/p>\n<h4><strong>1. Don\u2019t Panic<\/strong><\/h4>\n<p>When you think your website has been hacked, it\u2019s essential to stay calm as best you can.<\/p>\n<p>Panicking can lead to rushed decisions, which may worsen the situation.<\/p>\n<p>The most important thing is to attack the problem methodically.&nbsp; You can do this by taking the following steps.<\/p>\n<h4><strong>2. Confirm the Hack<\/strong><\/h4>\n<p>Before taking any major action steps, it\u2019s important to absolutely, without a shadow of a doubt confirm that your website has indeed been hacked.<\/p>\n<p>Check for<a href=\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/common-types-of-wordpress-hacks-how-to-protect-your-site\/\"> common signs of a hack<\/a> such as:<\/p>\n<ul>\n<li>Unusual website pop-ups;<\/li>\n<li>Unexpected changes to your site\u2019s appearance;<\/li>\n<li>Difficulty logging into your CMS;<\/li>\n<li>Notifications from your browser;<\/li>\n<li>Contact from hosting provider indicating that malicious code has been detected on your server.<\/li>\n<\/ul>\n<p>This step is crucial to ensure you\u2019re addressing the right issue and not a simple technical glitch.<\/p>\n<p><a href=\"#confirm-hack\">See more detailed steps below<\/a> on how to confirm a hack.<\/p>\n<h4><strong>3. Inform Your Hosting Provider<\/strong><\/h4>\n<p>Contact your hosting provider immediately. They have the tools and expertise to assist in addressing the issue.<\/p>\n<p>If you\u2019re using managed hosting, they might already be aware of the problem and could have begun taking steps to secure your site.<\/p>\n<p>Your hosting provider can advise you on whether further actions, such as taking the website offline, are necessary.<\/p>\n<h4><strong>4. Change All Passwords<\/strong><\/h4>\n<p>Change all passwords (and we mean ALL of them) associated with your website.<\/p>\n<p>This could include those for your Content Management System (CMS), email accounts, web hosting control panel, domain name registrar account and FTP accounts.<\/p>\n<p>If you aren&#8217;t sure how to do this, ask your hosting company what accesses they can update on your behalf and then consult your web developer to update the other passwords.<\/p>\n<p>Ensure the new passwords are strong, using a mix of uppercase and lowercase letters, numbers, and special characters.<\/p>\n<p>Enable TwoFactor Authentication if that option is available to you.<\/p>\n<h4><strong>5. Decide Whether to Take Your Website Offline<\/strong><\/h4>\n<p>Depending on the severity of the hack, you may need to take your website offline temporarily.<\/p>\n<p>This decision should be made in consultation with your hosting provider.<\/p>\n<p>Taking the site offline can prevent further damage but might also destroy valuable evidence that could help you understand how the hacker gained access.<\/p>\n<p>Tread carefully here and seek advice on the best way to move forward. If you need immediate assistance, we can help so give us a call on (07) 5531 3810.<\/p>\n<h4><strong>6. Communicate with Your Customers<\/strong><\/h4>\n<p>If your website contains private information like user accounts and it has been hacked, it\u2019s important to inform your customers promptly.<\/p>\n<p>Let them know about the breach if it impacts their data, what you are doing to address it, and any actions they should take, such as changing their passwords.<\/p>\n<p>Clear communication helps maintain trust and keeps your customers informed about the situation.<\/p>\n<h4>7. Clean &amp; Secure Your Website<\/h4>\n<p>After assessing the damage, the next step is to clean up your website and strengthen its defences.<\/p>\n<p>Seek professional help from a <a href=\"https:\/\/www.e-cbd.com.au\/hack-repair.html\">website hack repair &amp; malware removal service<\/a> to help get your website and database clean.<\/p>\n<h4>8. Work with professionals &amp; your hosting provider<\/h4>\n<p>After taking all the necessary steps to secure your website, it\u2019s time to let the professionals step in.<\/p>\n<p>Working with experts and your hosting provider will ensure that your website is thoroughly cleaned, secured, and protected against future attacks.<\/p>\n<p>Their expertise will give you peace of mind and allow you to focus on running your business while they handle the technical details.<\/p>\n<div id=\"confirm-hack\">&nbsp;<\/div>\n<h3><strong>II. Confirming the Hack<\/strong><\/h3>\n<p>Identifying the signs of a hack will ensure that you address the correct issue.<\/p>\n<h4><strong>Signs That Your Website Has Been Hacked<\/strong><\/h4>\n<p>Before proceeding, ensure that your website has indeed been hacked. Common signs include:<\/p>\n<ul>\n<li>Unusual pop-ups or content on your website.<\/li>\n<li>Suspicious user accounts in your CMS.<\/li>\n<li>Difficulty logging into your website\u2019s management tools.<\/li>\n<li>Notifications from your browser, hosting provider, or search engines that your site contains malicious code.<\/li>\n<li>Notification from Google Search Console that hacked content has been detected on your website.<\/li>\n<li>A significant drop in website traffic, possibly due to users being redirected elsewhere.<\/li>\n<li>Advice from one of your users that your website is exhibiting strange behaviour.<\/li>\n<li>Can&#8217;t send email or your email is being blocked because your domain has been blacklisted.<\/li>\n<\/ul>\n<h3>Other Methods to Confirm a Website Hack<\/h3>\n<p><strong>Check for Unusual Activity:<\/strong> Look for signs like unexpected pop-ups, changes in your site\u2019s appearance, difficulty logging into your CMS, or unusual user accounts.<\/p>\n<p><strong>Contact Your Hosting Provider:<\/strong> Reach out to your hosting provider to see if they have detected any suspicious activity or can confirm the presence of malicious code.<\/p>\n<p><strong>Run a Malware Scan:<\/strong> Use a trusted malware scanner to check your website for any malicious code or files that may have been injected.<\/p>\n<p><strong>Review Server Logs:<\/strong> Examine your server logs for unusual activity, such as unfamiliar IP addresses or unauthorised access attempts.<\/p>\n<p><strong>Consult Your Web Developer:<\/strong> If you work with a web developer, ask them to inspect the site for any signs of a hack and to help identify vulnerabilities.<\/p>\n<p><strong>Check within Search Engine Results:<\/strong> Google search for your website and look for warnings in search engine results, such as \u201cThis site may be hacked\u201d messages, which can indicate a compromise.<\/p>\n<h4><strong>Distinguishing Between IT Issues and Hacking<\/strong><\/h4>\n<p>Sometimes, what appears to be a hack might be a technical issue.<\/p>\n<p>It\u2019s important to confirm that your website has been compromised by examining server logs, unusual cron jobs, or other signs of unauthorised activity.<\/p>\n<p>This might involve contacting your hosting company, web developer or IT team to assist.<\/p>\n<p>Make sure you do this because it helps you to avoid taking unnecessary actions and remaining focused on resolving the actual problem.<\/p>\n<h3><strong>III. Assessing the Damage<\/strong><\/h3>\n<p>Once you\u2019ve confirmed the hack, it\u2019s essential to understand the extent of the damage. This will guide your recovery process and help you prevent future incidents.<\/p>\n<h4><strong>Make a Backup<\/strong><\/h4>\n<p>Before you start cleaning up the hack, create a complete backup of your website.<\/p>\n<p>This backup is not for restoration purposes but to preserve evidence of the hack.<\/p>\n<p>It can be useful for forensic analysis to understand how the hack occurred and what vulnerabilities were exploited.<\/p>\n<h4><strong>Investigate the Cause of the Hack<\/strong><\/h4>\n<p>Once your site is secure, begin investigating how the hacker gained access.<\/p>\n<p>This might involve checking for outdated core software, insecure plugins, a compromised shared web hosting server or weak passwords.<\/p>\n<p>Identifying the root cause is crucial for preventing future attacks.<\/p>\n<h4><strong>Check Other Websites and Servers<\/strong><\/h4>\n<p>If you manage multiple websites or servers, it\u2019s important to check whether the hack has affected any of them as well.<\/p>\n<p>Hackers often target multiple sites on the same server, especially if they share similar vulnerabilities.<\/p>\n<h3><strong>IV. Recovering and Securing Your Website<\/strong><\/h3>\n<p>These actions will help you restore your site\u2019s security and functionality.<\/p>\n<h4><strong>1. Remove Malware and Restore the Website<\/strong><\/h4>\n<p>Remove any malicious code or files from your website, database and possibly your server.<\/p>\n<p>You may need to reach out to a website hack repair service to help get your website and database clean.<\/p>\n<p>You may also be able to restore your site from a clean backup taken before the hack occurred if you were taking proactive backups that were stored external to your web server.<\/p>\n<p>Getting professional help for this step ensures that your website is free from malware and other harmful elements.<\/p>\n<h4><strong>2. Update Your CMS and Software<\/strong><\/h4>\n<p>Ensure that your CMS, plugins, and all other software components are updated to their latest versions.<\/p>\n<p>Outdated software often contains vulnerabilities that hackers exploit.<\/p>\n<p>Keeping everything updated helps close these security gaps.<\/p>\n<h4><strong>3. Implement Security Measures<\/strong><\/h4>\n<p>To prevent future hacks, implement security measures such as web application firewalls (WAF), up-time monitoring systems, and regular web software updates.<\/p>\n<p>Consider using reputable website security plugins (see <a href=\"https:\/\/www.e-cbd.com.au\/blog\/website-advice\/our-favourite-free-paid-security-plugins-for-wordpress\/\">our favourite security plugins here<\/a>) that offer real-time protection and alerts for suspicious activity.<\/p>\n<h3><strong>V. Preventing Future Hacks<\/strong><\/h3>\n<p>Prevention is key to protecting your website from future attacks.<\/p>\n<p>Implementing the following website security measures will help you safeguard your site and maintain its integrity in the future.<\/p>\n<h4><strong>Regular Maintenance and Updates<\/strong><\/h4>\n<p>Ongoing maintenance is key to keeping your website secure.<\/p>\n<p>Regularly update all core software and plugins, monitor your website for unusual activity, and perform security audits to identify potential vulnerabilities.<\/p>\n<p>The best solution here is to engage a professional to take care of your website with a <a href=\"https:\/\/www.e-cbd.com.au\/wordpress-modx-care-packages.html\">managed website maintenance plan<\/a>.<\/p>\n<h4><strong>Proactive Backups<\/strong><\/h4>\n<p>Set up automatic backups to ensure that you can quickly restore your website if another incident occurs.<\/p>\n<p>Regular backups reduce downtime and minimise the risk of data loss.<\/p>\n<h4><strong>Advanced Security Measures<\/strong><\/h4>\n<p>Consider enhancing your website\u2019s security with advanced measures such as managed hosting services, which offer additional layers of protection.<\/p>\n<p>Professional security services can also provide continuous monitoring and quick responses to any new threats.<\/p>\n<h3><strong>VI. Understanding the Broader Impact of a Compromise<\/strong><\/h3>\n<p>A website hack can have lasting effects on your business, your customers and your website SEO performance.<\/p>\n<h4><strong>Long-Term Effects on Your Website and Business<\/strong><\/h4>\n<p>Understanding <a href=\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/how-a-hacked-website-negatively-impacts-business\/\">the key consequences of a website hack<\/a> underscores the importance of taking security seriously.<\/p>\n<p>Beyond the immediate loss of site functionality, a hack can damage your site\u2019s reputation, lead to a loss of trust among customers, and negatively impact your search engine rankings.<\/p>\n<h4><strong>How to Strengthen Your Website Against Future Threats<\/strong><\/h4>\n<p>Taking steps now to strengthen your website\u2019s security can protect your business from future attacks.<\/p>\n<p>Regularly updating software, monitoring activity, and educating your team on best security practices are all essential parts of this process.<\/p>\n<h3><strong>VII. Survive, Recover and Rebuild<\/strong><\/h3>\n<p>Dealing with a website hack can be overwhelming, but it\u2019s important to focus on the essential steps to regain control and protect your business.<\/p>\n<p>By staying calm, acting quickly, and following a structured recovery process, you can minimise the damage and start rebuilding.<\/p>\n<p>Recovering from a hack is not just about fixing the immediate problem\u2014it\u2019s about strengthening your website to withstand future threats.<\/p>\n<p>This process involves <a href=\"https:\/\/www.e-cbd.com.au\/blog\/website-advice\/the-importance-of-a-website-maintenance-plan\/\">regular website maintenance<\/a>, proactive backups, and ongoing vigilance to protect your site and maintain the trust of your users.<\/p>\n<h3><strong>Been Hacked and Need Expert Help?<\/strong><\/h3>\n<p>If your website has been hacked and you need professional assistance, we\u2019re here to help. At e-CBD, we are experts in website security and site hack recovery.<\/p>\n<p>Our team can quickly assess the damage, remove malicious code, and implement robust security measures to protect your site from future attacks.<\/p>\n<p>Don\u2019t let a hack derail your business\u2014<a href=\"https:\/\/www.e-cbd.com.au\/contact-us.html\">contact us today<\/a> to get your website back on track.<\/p>\n<h2 id=\"faqs\">FAQs<\/h2>\n<h3>1) How can I tell if my website has been hacked?<\/h3>\n<p>Common signs include unusual pop-ups, unexpected changes to your site\u2019s appearance, difficulty logging into your CMS,<br \/>\nbrowser security warnings, alerts from your hosting provider, Search Console security notifications, and sudden traffic drops<br \/>\n(sometimes caused by malicious redirects). :contentReference[oaicite:6]{index=6}<\/p>\n<h3>2) What should I do first if I suspect a hack?<\/h3>\n<p>Start by confirming the hack and then take immediate steps to regain control and minimise damage. If the site is actively harming users<br \/>\n(malware\/phishing), consider temporarily taking it offline while you secure access and begin cleanup. :contentReference[oaicite:7]{index=7}<\/p>\n<h3>3) Should I change passwords straight away?<\/h3>\n<p>Yes. Update passwords for WordPress\/CMS admin accounts, hosting control panel, FTP\/SFTP, database access, and any connected services.<br \/>\nAlso remove suspicious users and ensure only trusted accounts have administrator access. :contentReference[oaicite:8]{index=8}<\/p>\n<h3>4) Can a hack damage my SEO and Google rankings?<\/h3>\n<p>Yes. Hacks can inject spam pages, hidden links, or malicious redirects, which can lead to indexing issues, warnings in search results,<br \/>\nloss of user trust, and traffic drops until the site is fully cleaned and secured. :contentReference[oaicite:9]{index=9}<\/p>\n<h3>5) Is restoring a backup enough to fix a hacked site?<\/h3>\n<p>A clean backup can help, but you must also identify and fix the entry point (e.g., outdated plugins\/themes, weak credentials, insecure access).<br \/>\nOtherwise, reinfection is common. :contentReference[oaicite:10]{index=10}<\/p>\n<h3>6) How do I prevent my website from being hacked again?<\/h3>\n<p>Keep WordPress\/plugins\/themes updated, remove unused plugins\/themes, use strong unique passwords and MFA, limit admin access,<br \/>\nset up reliable backups, and use monitoring\/security tools (firewall, malware scanning, file change alerts) so you detect issues early. :contentReference[oaicite:11]{index=11}<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Found a hack or malware on your website? Don&#8217;t panic, here is our simple step-by-step guide for dealing with a hacked website. No website is completely immune to attacks and sites are hacked every day. This guide will walk you through the immediate actions you need to take. Key takeaways Stay calm and act methodically &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;What To Do When Your Website Has Been Hacked&#8221;<\/span><\/a><\/p>\n<p><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":1,"featured_media":5408,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[285,34],"tags":[],"class_list":["post-5399","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-website-advice"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Has Your Website Been Hacked? Here Is What To Do Next [Guide]<\/title>\n<meta name=\"description\" content=\"Found a hack or malware on your website? Don&#039;t panic, here is our simple step-by-step guide for dealing with a hacked website.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Has Your Website Been Hacked? Here Is What To Do Next [Guide]\" \/>\n<meta property=\"og:description\" content=\"Found a hack or malware on your website? Don&#039;t panic, here is our simple step-by-step guide for dealing with a hacked website.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"e-CBD Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-21T23:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-23T16:25:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2024\/08\/google-deceptive-hacked-website.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"434\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/#\/schema\/person\/e2509f8c4c6deda9a5360abe94890930\"},\"headline\":\"What To Do When Your Website Has Been Hacked\",\"datePublished\":\"2026-02-21T23:00:07+00:00\",\"dateModified\":\"2026-02-23T16:25:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/\"},\"wordCount\":2262,\"publisher\":{\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2024\/08\/google-deceptive-hacked-website.png\",\"articleSection\":[\"Internet Security\",\"Website Advice\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/\",\"url\":\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/\",\"name\":\"Has Your Website Been Hacked? Here Is What To Do Next [Guide]\",\"isPartOf\":{\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2024\/08\/google-deceptive-hacked-website.png\",\"datePublished\":\"2026-02-21T23:00:07+00:00\",\"dateModified\":\"2026-02-23T16:25:35+00:00\",\"description\":\"Found a hack or malware on your website? Don't panic, here is our simple step-by-step guide for dealing with a hacked website.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/#primaryimage\",\"url\":\"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2024\/08\/google-deceptive-hacked-website.png\",\"contentUrl\":\"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2024\/08\/google-deceptive-hacked-website.png\",\"width\":1024,\"height\":434,\"caption\":\"Google's deceptive website ahead error screen\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/#website\",\"url\":\"https:\/\/www.e-cbd.com.au\/blog\/\",\"name\":\"e-CBD Blog\",\"description\":\"Internet Marketing &amp; Website Advice, Trends &amp; Topics\",\"publisher\":{\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.e-cbd.com.au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/#organization\",\"name\":\"e-CBD\",\"url\":\"https:\/\/www.e-cbd.com.au\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2019\/02\/ecbd-landscape-blue.png\",\"contentUrl\":\"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2019\/02\/ecbd-landscape-blue.png\",\"width\":302,\"height\":187,\"caption\":\"e-CBD\"},\"image\":{\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/#\/schema\/person\/e2509f8c4c6deda9a5360abe94890930\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.e-cbd.com.au\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e45f37b834efbb460558aa0f93049c1dc7c69b815ed2c519b91fc9bef0ba86db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e45f37b834efbb460558aa0f93049c1dc7c69b815ed2c519b91fc9bef0ba86db?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/www.e-cbd.com.au\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Has Your Website Been Hacked? Here Is What To Do Next [Guide]","description":"Found a hack or malware on your website? Don't panic, here is our simple step-by-step guide for dealing with a hacked website.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/","og_locale":"en_US","og_type":"article","og_title":"Has Your Website Been Hacked? Here Is What To Do Next [Guide]","og_description":"Found a hack or malware on your website? Don't panic, here is our simple step-by-step guide for dealing with a hacked website.","og_url":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/","og_site_name":"e-CBD Blog","article_published_time":"2026-02-21T23:00:07+00:00","article_modified_time":"2026-02-23T16:25:35+00:00","og_image":[{"width":1024,"height":434,"url":"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2024\/08\/google-deceptive-hacked-website.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/#article","isPartOf":{"@id":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/"},"author":{"name":"admin","@id":"https:\/\/www.e-cbd.com.au\/blog\/#\/schema\/person\/e2509f8c4c6deda9a5360abe94890930"},"headline":"What To Do When Your Website Has Been Hacked","datePublished":"2026-02-21T23:00:07+00:00","dateModified":"2026-02-23T16:25:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/"},"wordCount":2262,"publisher":{"@id":"https:\/\/www.e-cbd.com.au\/blog\/#organization"},"image":{"@id":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2024\/08\/google-deceptive-hacked-website.png","articleSection":["Internet Security","Website Advice"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/","url":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/","name":"Has Your Website Been Hacked? Here Is What To Do Next [Guide]","isPartOf":{"@id":"https:\/\/www.e-cbd.com.au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2024\/08\/google-deceptive-hacked-website.png","datePublished":"2026-02-21T23:00:07+00:00","dateModified":"2026-02-23T16:25:35+00:00","description":"Found a hack or malware on your website? Don't panic, here is our simple step-by-step guide for dealing with a hacked website.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.e-cbd.com.au\/blog\/internet-security\/what-to-do-when-your-website-has-been-hacked\/#primaryimage","url":"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2024\/08\/google-deceptive-hacked-website.png","contentUrl":"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2024\/08\/google-deceptive-hacked-website.png","width":1024,"height":434,"caption":"Google's deceptive website ahead error screen"},{"@type":"WebSite","@id":"https:\/\/www.e-cbd.com.au\/blog\/#website","url":"https:\/\/www.e-cbd.com.au\/blog\/","name":"e-CBD Blog","description":"Internet Marketing &amp; Website Advice, Trends &amp; Topics","publisher":{"@id":"https:\/\/www.e-cbd.com.au\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.e-cbd.com.au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.e-cbd.com.au\/blog\/#organization","name":"e-CBD","url":"https:\/\/www.e-cbd.com.au\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.e-cbd.com.au\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2019\/02\/ecbd-landscape-blue.png","contentUrl":"https:\/\/www.e-cbd.com.au\/blog\/wp-content\/uploads\/2019\/02\/ecbd-landscape-blue.png","width":302,"height":187,"caption":"e-CBD"},"image":{"@id":"https:\/\/www.e-cbd.com.au\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.e-cbd.com.au\/blog\/#\/schema\/person\/e2509f8c4c6deda9a5360abe94890930","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.e-cbd.com.au\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e45f37b834efbb460558aa0f93049c1dc7c69b815ed2c519b91fc9bef0ba86db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e45f37b834efbb460558aa0f93049c1dc7c69b815ed2c519b91fc9bef0ba86db?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.e-cbd.com.au\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/posts\/5399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/comments?post=5399"}],"version-history":[{"count":7,"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/posts\/5399\/revisions"}],"predecessor-version":[{"id":5457,"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/posts\/5399\/revisions\/5457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/media\/5408"}],"wp:attachment":[{"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/media?parent=5399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/categories?post=5399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.e-cbd.com.au\/blog\/wp-json\/wp\/v2\/tags?post=5399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}