SlideShare a Scribd company logo
How to fix a hacked site and
harden security
Presented by Tim Plummer
Joomla User Group Sydney
11th June 2019
Recognising your site is hacked
• Sometimes it’s obvious, other times more subtle
Other common indicators of hacked site
• Blacklist warning by Google etc.
• Warnings from web host regarding resource usage
• Complaints from customers
• Unusual file modifications (template, core files etc)
• Malicious new users created on your site
• Unexpected or abnormal browser behaviour
Immediate response
• Do you have a disaster recovery plan?
• What can you do quickly to minimize damage/exposure?
• Site offline / maintenance mode (if appropriate)
• Change passwords (Cpanel, Joomla Admin, etc)
Why did my site get hacked
• Deface / vandalize
• Spreading malware
• Hacker showing off
• Profit (e.g. crypto currency mining, spamming)
• Targeted attack, for example to obtain personal information
How did my site get hacked?
• Look for evidence in Cpanel error logs/raw access logs
• 77.221.130.18 - - [09/May/2019:08:54:59 +1000] "GET
/index.php?option=com_myfiles&controller=../../../../../../../../../../../../..//proc/self/environ%0000 HTTP/1.1" 404 613 "-"
"Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.2; Windows NT 5.1;)“
• 77.222.40.87 - - [09/May/2019:13:28:02 +1000] "GET
//index.php?option=com_alphauserpoints&view=../../../../../../../../../../../../..//proc/self/environ%0000 HTTP/1.1" 404 613
"-" "Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7.12) Gecko/20050915 Firefox/1.0.7"
Do I have any outdated or insecure extensions?
• Check Joomla! Vulnerable Extension List
https://vel.joomla.org/
Is your core Joomla version up-to-date?
Is your PHP version up-to-date?
Does your computer have any malware?
Are there any other sites on this hosting account?
• Could the vulnerability be due to another site/app on the hosting
account
• For example, the recent Joomla Extension Directory vulnerability was caused by an outdated
Stapler web framework used by Jenkins, which is the tool used for daily automated testing
etc.
Damage assessment
• What files have been modified?
• Have any files been uploaded?
How does the hack affect your customers?
• Is there any personal/financial information exposure – do you need to
report a mandatory data breech?
https://www.oaic.gov.au/privacy-law/privacy-act/notifiable-data-breaches-scheme
• Do you need to retain a copy of hacked files and logs for
evidence/further investigation?
Recovery considerations
• Do you have a good (offsite) backup from before the hack? Will there
be any data loss if you restored this?
• Have you addressed the source of the hack?
• Is manually cleaning the files appropriate (editing source code to remove
injected code)?
• Should you reinstall Joomla over the top to restore core files?
• Can you fix this yourself, or do you need to engage security
professionals?
• Do you need to change passwords (Cpanel, Joomla admin users, mySQL, FTP
accounts etc)
• Do you need to clean database (remove users and suspicious content)
Recovery considerations
• Do you need to contact web host to remove suspension?
• Do you need to request removal from blacklisting (e.g. Google Search
Console)
Helpful tools/services
• Myjoomla.com audit / fix hacked
site service
• Watchful.li malware scan
Hardening your site
• Firewall software (e.g. Akeeba Admin Tools or RSFirewall)
• .htaccess rules to block common exploits
• Make sure all software is up-to-date (core Joomla, extensions, PHP etc).
• Limit who has admin/super user access
• Regular malware scans (both your site and computer)
• Regular review of logs, hosting resources etc. looking for suspicious activity
After your site is fixed
• Continue to monitor to ensure site doesn’t get hacked again (maybe you
missed the true source of the hack in your cleanup)
• Remember, security is not a once off exercise, you should regularly
review your site security and make incremental improvements as
needed.

More Related Content

PDF
Effective Steps to Fix Joomla Hacking and Remove Malware
PDF
Sucuri Webinar: How to identify and clean a hacked Joomla! website
PPTX
Brendon Hatcher Joomla Security
PDF
Your WordPress Site is and is not Hacked - You don't know until you check
PDF
My Site Was Hacked!
PDF
Joomla! security jday2015
PDF
Seven steps to better security
PDF
Security Presentation for Boulder WordPress Meetup
Effective Steps to Fix Joomla Hacking and Remove Malware
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Brendon Hatcher Joomla Security
Your WordPress Site is and is not Hacked - You don't know until you check
My Site Was Hacked!
Joomla! security jday2015
Seven steps to better security
Security Presentation for Boulder WordPress Meetup

Similar to How to fix a hacked site and harden June 2019 (20)

PPTX
Joomla! security jday2015
PPTX
Post Mortem of a Hacked Website - Wordcamp Sunshine Coast 2016
PDF
Leaked! Confessions of a Joomla DEV
PDF
Are you ready to be hacked?
PDF
Tips for Fixing A Hacked WordPress Site - Vlad Lasky
PPTX
WordPress Security and Best Practices
PDF
How to Increase Security on your Wordpress Website
PDF
ResellerClub Ctrl+F5 - WordPress Security session
PPTX
Tips for Fixing a Hacked WordPress Site - WordCamp Sydney 2016
PPTX
Keeping Your Joomla! Site Secure
PDF
How to get recover from a hacked website
PDF
Columbus WordCamp 2015
PPTX
WordPress Security 101
PPTX
Locking Down Your WordPress Site
PPTX
Word press security 101 2018
PPTX
Securing Your Joomla website
PPTX
Hacked - What do you do now?
PDF
Joomla Security Basics presented by Jeff Mendelson
PPT
Avoid Getting Hacked! Presentation on Joomla! Web Security
PPT
2010 11 pubcon_hendison-hosting
Joomla! security jday2015
Post Mortem of a Hacked Website - Wordcamp Sunshine Coast 2016
Leaked! Confessions of a Joomla DEV
Are you ready to be hacked?
Tips for Fixing A Hacked WordPress Site - Vlad Lasky
WordPress Security and Best Practices
How to Increase Security on your Wordpress Website
ResellerClub Ctrl+F5 - WordPress Security session
Tips for Fixing a Hacked WordPress Site - WordCamp Sydney 2016
Keeping Your Joomla! Site Secure
How to get recover from a hacked website
Columbus WordCamp 2015
WordPress Security 101
Locking Down Your WordPress Site
Word press security 101 2018
Securing Your Joomla website
Hacked - What do you do now?
Joomla Security Basics presented by Jeff Mendelson
Avoid Getting Hacked! Presentation on Joomla! Web Security
2010 11 pubcon_hendison-hosting

More from Tim Plummer (20)

PPTX
Aujug 2020 joomla 4 workflow
PPTX
TinyMCE for Joomla
PPTX
Joomla 4 custom fields and workflow
PPTX
Creating your own joomla templates April 2019
PPTX
Custom fields in Joomla March 2019
PPTX
Whats new in Joomla 3.9
PPTX
Lessons from the other side
PPTX
Getting the most from your social media posts on facebook and instagram
PPTX
Tips for site builders and administrators
PPTX
Joomla 4.0 what's coming in future
PPTX
What’s new in joomla 3.7
PPTX
Simplify your Joomla user registration form
PPTX
How to customise Joomla
PPTX
Maintaining a joomla website - Canberra
PPTX
Custom fields in joomla
PPTX
Whats new in joomla 3.5 & whats coming in future
PPTX
Joomla SEO basics 2016
PPTX
What's new in joomla! 3.5 - 8th Nov 2015
PPTX
Cross CMS plugin development using AWF
PPTX
Growing your business by hiring an offshore staff member
Aujug 2020 joomla 4 workflow
TinyMCE for Joomla
Joomla 4 custom fields and workflow
Creating your own joomla templates April 2019
Custom fields in Joomla March 2019
Whats new in Joomla 3.9
Lessons from the other side
Getting the most from your social media posts on facebook and instagram
Tips for site builders and administrators
Joomla 4.0 what's coming in future
What’s new in joomla 3.7
Simplify your Joomla user registration form
How to customise Joomla
Maintaining a joomla website - Canberra
Custom fields in joomla
Whats new in joomla 3.5 & whats coming in future
Joomla SEO basics 2016
What's new in joomla! 3.5 - 8th Nov 2015
Cross CMS plugin development using AWF
Growing your business by hiring an offshore staff member

Recently uploaded (20)

PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
L1 - Introduction to python Backend.pptx
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
history of c programming in notes for students .pptx
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
Nekopoi APK 2025 free lastest update
PPTX
ai tools demonstartion for schools and inter college
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
Introduction to Artificial Intelligence
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
medical staffing services at VALiNTRY
How Creative Agencies Leverage Project Management Software.pdf
CHAPTER 2 - PM Management and IT Context
Design an Analysis of Algorithms II-SECS-1021-03
L1 - Introduction to python Backend.pptx
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Odoo Companies in India – Driving Business Transformation.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
history of c programming in notes for students .pptx
ISO 45001 Occupational Health and Safety Management System
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
ManageIQ - Sprint 268 Review - Slide Deck
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Nekopoi APK 2025 free lastest update
ai tools demonstartion for schools and inter college
Navsoft: AI-Powered Business Solutions & Custom Software Development
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Introduction to Artificial Intelligence
Adobe Illustrator 28.6 Crack My Vision of Vector Design
medical staffing services at VALiNTRY

How to fix a hacked site and harden June 2019

  • 1. How to fix a hacked site and harden security Presented by Tim Plummer Joomla User Group Sydney 11th June 2019
  • 2. Recognising your site is hacked • Sometimes it’s obvious, other times more subtle
  • 3. Other common indicators of hacked site • Blacklist warning by Google etc. • Warnings from web host regarding resource usage • Complaints from customers • Unusual file modifications (template, core files etc) • Malicious new users created on your site • Unexpected or abnormal browser behaviour
  • 4. Immediate response • Do you have a disaster recovery plan? • What can you do quickly to minimize damage/exposure? • Site offline / maintenance mode (if appropriate) • Change passwords (Cpanel, Joomla Admin, etc)
  • 5. Why did my site get hacked • Deface / vandalize • Spreading malware • Hacker showing off • Profit (e.g. crypto currency mining, spamming) • Targeted attack, for example to obtain personal information
  • 6. How did my site get hacked? • Look for evidence in Cpanel error logs/raw access logs • 77.221.130.18 - - [09/May/2019:08:54:59 +1000] "GET /index.php?option=com_myfiles&controller=../../../../../../../../../../../../..//proc/self/environ%0000 HTTP/1.1" 404 613 "-" "Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.2; Windows NT 5.1;)“ • 77.222.40.87 - - [09/May/2019:13:28:02 +1000] "GET //index.php?option=com_alphauserpoints&view=../../../../../../../../../../../../..//proc/self/environ%0000 HTTP/1.1" 404 613 "-" "Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7.12) Gecko/20050915 Firefox/1.0.7"
  • 7. Do I have any outdated or insecure extensions? • Check Joomla! Vulnerable Extension List https://vel.joomla.org/
  • 8. Is your core Joomla version up-to-date?
  • 9. Is your PHP version up-to-date?
  • 10. Does your computer have any malware?
  • 11. Are there any other sites on this hosting account? • Could the vulnerability be due to another site/app on the hosting account • For example, the recent Joomla Extension Directory vulnerability was caused by an outdated Stapler web framework used by Jenkins, which is the tool used for daily automated testing etc.
  • 12. Damage assessment • What files have been modified? • Have any files been uploaded?
  • 13. How does the hack affect your customers? • Is there any personal/financial information exposure – do you need to report a mandatory data breech? https://www.oaic.gov.au/privacy-law/privacy-act/notifiable-data-breaches-scheme • Do you need to retain a copy of hacked files and logs for evidence/further investigation?
  • 14. Recovery considerations • Do you have a good (offsite) backup from before the hack? Will there be any data loss if you restored this? • Have you addressed the source of the hack? • Is manually cleaning the files appropriate (editing source code to remove injected code)? • Should you reinstall Joomla over the top to restore core files? • Can you fix this yourself, or do you need to engage security professionals? • Do you need to change passwords (Cpanel, Joomla admin users, mySQL, FTP accounts etc) • Do you need to clean database (remove users and suspicious content)
  • 15. Recovery considerations • Do you need to contact web host to remove suspension? • Do you need to request removal from blacklisting (e.g. Google Search Console)
  • 16. Helpful tools/services • Myjoomla.com audit / fix hacked site service • Watchful.li malware scan
  • 17. Hardening your site • Firewall software (e.g. Akeeba Admin Tools or RSFirewall) • .htaccess rules to block common exploits • Make sure all software is up-to-date (core Joomla, extensions, PHP etc). • Limit who has admin/super user access • Regular malware scans (both your site and computer) • Regular review of logs, hosting resources etc. looking for suspicious activity
  • 18. After your site is fixed • Continue to monitor to ensure site doesn’t get hacked again (maybe you missed the true source of the hack in your cleanup) • Remember, security is not a once off exercise, you should regularly review your site security and make incremental improvements as needed.