Identifying Malicious Redirects on Your Website

If attackers compromise your site, they might insert malicious code that redirects visitors to phising or malware sites. Or they might also lure visitors to the malicious redirects with spam email. Those messages can be something as simple as:

Subject: Hello!

Body: News: http://[your domain name]/jyl/wnews.php

If you see messages like this about your own site, you should review your website content for files containing malicious redirects. Typically, these files are created in separate directories, like these:

  • /uuc/news_id.php
  • /zkd/news_fx.php
  • /dgmq/w_news.php
  • /cisc/br-news.php

These files will contain a list of domains and a line of code that performs the actual redirect — they look something like this:

<meta http-equiv="refresh" content="2; url= ">

The code http-equiv gets the visitors' browser to load the malicious website.

Obviously, you want to remove any files containing redirects as soon as possible.

Protecting Your Site

There are many ways attackers can insert this malicious code on your site. If this has happened to you, we recommend the following to secure your site:

  • Review your hosting account to ensure that it does not contain any additional malicious content. We have some information about this in What is an FTP compromise?
  • Update any applications your website uses to their latest versions (e.g. WordPress, Joomla, etc.).
  • Update all themes, plugins, and extensions to their latest versions.
  • Change all of your account passwords (including FTP, application, and databases).
  • Update your anti-virus and scan your local workstation for signs of compromise.
  • Consider using website security software like Website Security to scan your site for vulnerabilities and compromises. We have more information about that Website Security now at 15-Percent Off Listed Prices here.

You can also find more information about application security compromises in My website was hacked. What should I do?.