Hello,
I just got following email from Google "hacked content detected on http://www.medicalgeek.com"
On Google search also it is showing the site may be hacked in search results. I didn't notice any change in my website or spam right now although last month there was some server attack and hosting provider had blocked those IP. Email from Google as received :
More information which i got after logging in to google webmaster tools :
Can anyone guide what to do? how to fix it? I have already emailed my hosting provider too and but posted here to ask what i can do from vbulletin point of view..
I just got following email from Google "hacked content detected on http://www.medicalgeek.com"
On Google search also it is showing the site may be hacked in search results. I didn't notice any change in my website or spam right now although last month there was some server attack and hosting provider had blocked those IP. Email from Google as received :
"Google has detected that your site has been hacked by a third party who created malicious content on some of your pages. This critical issue utilises your site’s reputation to redirect your potential visitors away from your site to unexpected or harmful content. It also lowers the quality of results for Google Search users. Therefore, we have applied a manual action to your site that will warn users of hacked content when your site appears in search results. This manual spam action has been applied to medicalgeek.com/. To remove this warning, clean up the hacked content and file a reconsideration request. After we determine that your site no longer has hacked content, we will remove this manual action.
Here’s how to fix this problem:
1
Check Security Issues for details of the hack
Use the examples provided in the Security Issues of Search Console to get an initial sample of hacked pages that cause redirects.
Security Issues
2
Look for other compromised pages or files on your site
Make sure to check your entire site, including the home page, for any unfamiliar content that could have been added. The malicious code might be placed in HTML, JavaScript or other files on your site. It can also be hidden in places that you might overlook, such as server configuration files (e.g. .htaccess file) or other dynamic scripting pages (e.g. PHP, JSP). It’s important to be thorough in your investigation.
3
Use the Fetch as Google tool to isolate the malicious content
Because some pages can appear one way to a user and another way to Google crawlers, you can use the Fetch as Google tool to reveal some kinds of hacking. Enter URLs from your site in the tool to see the pages as Google sees them. If the page has hidden hacked content, the tool can reveal that content.
Fetch as Google
4
Remove all malicious content
You can also contact your hosting provider and ask them for assistance. If you’re having trouble identifying and removing all the content on your site that is compromised, consider restoring an older backed-up version of your site.
5
Secure your site from any future attacks
Identify and fix vulnerabilities that caused your site to be compromised. Change passwords for administrative accounts. Consider contacting your hosting service to get help with the issue.
6
Submit a reconsideration request
Once you have fixed your site, file for reconsideration to remove this manual action. Include any details or documentation that can help us understand the changes made to your site.
Reconsideration "
Here’s how to fix this problem:
1
Check Security Issues for details of the hack
Use the examples provided in the Security Issues of Search Console to get an initial sample of hacked pages that cause redirects.
Security Issues
2
Look for other compromised pages or files on your site
Make sure to check your entire site, including the home page, for any unfamiliar content that could have been added. The malicious code might be placed in HTML, JavaScript or other files on your site. It can also be hidden in places that you might overlook, such as server configuration files (e.g. .htaccess file) or other dynamic scripting pages (e.g. PHP, JSP). It’s important to be thorough in your investigation.
3
Use the Fetch as Google tool to isolate the malicious content
Because some pages can appear one way to a user and another way to Google crawlers, you can use the Fetch as Google tool to reveal some kinds of hacking. Enter URLs from your site in the tool to see the pages as Google sees them. If the page has hidden hacked content, the tool can reveal that content.
Fetch as Google
4
Remove all malicious content
You can also contact your hosting provider and ask them for assistance. If you’re having trouble identifying and removing all the content on your site that is compromised, consider restoring an older backed-up version of your site.
5
Secure your site from any future attacks
Identify and fix vulnerabilities that caused your site to be compromised. Change passwords for administrative accounts. Consider contacting your hosting service to get help with the issue.
6
Submit a reconsideration request
Once you have fixed your site, file for reconsideration to remove this manual action. Include any details or documentation that can help us understand the changes made to your site.
Reconsideration "
"Code injection
These pages may be hacked to redirect certain users to a spam site.
Recommended actions
1. Review our resources about hacked: code injection.
2. Check your source code (such as JavaScript files) and server configuration files (such as Apache's .htaccess) for any unauthorised changes."
These pages may be hacked to redirect certain users to a spam site.
Recommended actions
1. Review our resources about hacked: code injection.
2. Check your source code (such as JavaScript files) and server configuration files (such as Apache's .htaccess) for any unauthorised changes."
Comment