How Would You Know Your Website Has Been Hijacked?

A representative malware scanner alert

Now that you understand why your website may have been hijacked, you want to know if your website has been hijacked.  Finding out your website has been hijacked is not necessarily easy. Sometimes site owners think they have been attacked, when it was something innocuous. But discovery of a hijack can happen a number of different ways, and many of them can be embarrassing.

  • Your web hosting provider informs you of a malicious infection or activity and takes your site offline.
  • Your web browser, or those used by your customers, spawns a warning.
  • Your computer’s malware scanner, or those used by your customers, alerts on your site
  • Your customer gets infected on your site and contacts you.
  • Your site may show up in Google search results as dangerous or compromised
  • Your Google Search Console account warns you about a malware infection.

Examples of these warnings follow.  These are common indications that your site has been compromised.

A Firefox browser warning

A Firefox browser warning

A Google Search Console alert

A Google search result showing security concerns

0

About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.