Wait! Please don't visit that site right now!
Google detected badware on the site you were visiting. Firefox uses Google's blacklist to warn you about "Reported attack sites." We understand that you may know and trust this site, but it's possible for good sites to be infected with badware without the site owners' knowledge or permission.
Who is StopBadware?
StopBadware is a nonprofit organization that fights badware. Google and Firefox link to us to help you understand the warnings. We also help website owners prevent and clean up badware websites.
I visited the site and didn't see any badware
Many kinds of badware aren't visible or obvious, and they can install silently as soon as you visit an infected page. Google's detection systems are VERY accurate. We suggest you don't visit the site again until the owner resolves the problem!
Help! This is my site.
We know this is frustrating. To remove the warnings, you'll need to find the problem, clean it up, and request a review. We can help you do this.
My site has badware
How do I know if my site is infected?
One indication that your site may have been infected with badware is if your site displays a browser warning, such as "Reported attack site" or "This site may harm your computer." A warning like this means that Google has detected something suspicious on your site, and your site may have been altered or infected without your knowledge. Google and several other companies issue warnings about compromised websites in order to protect users—like your site's visitors. StopBadware can help you figure out what to do next and how to get your site off the blacklist.
Other indications that your site may be infected:
- Visitors see a warning from their antivirus software when they visit your site
- You see strange search engine results for your site, such as advertisements for pharmaceutical products
- Your site redirects to an unknown domain when you navigate to it in your browser, or when you try to access it from search engine results
- You notice that permissions or files have been altered, or new users have been added
- You have email notifications from Google or your web hosting provider about possible malware on your site
How did this happen?
Most sites we see are compromised through a security hole, like outdated software or plugins, stolen passwords, or insecure permissions. Using an infected PC to update your website can also cause the site to become infected. Another common way that legitimate sites are compromised is through the ads provided by an advertising network. Many ad networks take steps to guard against bad ads, but this system is not foolproof.
If your site has been infected, it's important that you take it offline until you have identified and removed the badware. If your visitors access your site while it is still infected, their computers may be put at risk!
Your first step in cleaning up is to learn how to identify and remove badware.
Common hacks
This page provides information about identifying and removing website badware. It does not cover every situation, only the most common cases we see at StopBadware. Some cases may require further help from a security professional. For additional information and volunteer assistance,
visit our community forum: BadwareBusters.org.
Before you clean up your site, we recommend you:
- Take your site offline. Doing this will help you protect your visitors.
- Use a reputable antivirus product to scan your PC. Antivirus software won't detect infections on your website, but if your PC is infected, it can compromise your website. Make sure your PC is clean before you make any changes to your site.
- Make sure you are running the latest version of your website software. Whether it's WordPress, Joomla, osCommerce, or something else, be sure you have the latest version. Update if your software is outdated.
- Change all passwords. That means your FTP/SFTP password, admin panel, and anything else you use to log in or alter your website.
Common types of badware behavior
The three most common types of badware behavior StopBadware sees on compromised websites are malicious scripts, .htaccess redirects, and hidden iframes.
Malicious scripts
Malicious scripts are often used to redirect website visitors to a different site, or to load badware from another source. See how this script misspells "analytics"? Some malicious scripts use names that look like they're coming from legitimate sites.

These scripts will often be injected by an attacker into the content of your web pages, or sometimes into other files on your server, such as images or PDFs. Sometimes, instead of injecting the entire script into your web pages, the attacker will only inject a pointer to a .js or other file that the attacker saves in a directory on your web server.
Many malicious scripts (like the one below) use obfuscation to make them more difficult for antivirus scanners to detect.
.htaccess redirects
The Apache web server, which is used by many hosting providers, uses a hidden server file called .htaccess to configure certain access settings for directories on the website. Attackers will sometimes modify an existing .htaccess file on your web server or upload new .htaccess files to your web server containing instructions to redirect users to badware websites.
Hidden iframes
An iframe is a section of a web page that loads content from another page or site. Attackers will often inject malicious iframes into a web page or other file on your server. Often, these iframes will be configured so they don't show up on the web page when someone visits the page, but the malicious content they are loading will still load, hidden from the visitor's view.
How do I find badware on my site?
If Google is blacklisting your site for suspicious activity, you can use Google Webmaster Tools to find more information about what Google detected. If you do not have a Webmaster Tools account, you can create one for free. The "Fetch as Google" tool in Webmaster Tools helps you look at parts of your site the way Google's detection systems see them.
You can also look at Google's Safe Browsing diagnostic page for your site. To see your site's Google diagnostic page, replace "example.com" in the following URL with your site's domain:
http://google.com/safebrowsing/diagn...://example.com
Other ways to look for badware:
- Ask for help from StopBadware's community forum. Our community members include several security experts and professionals who may be able to offer you specific advice about your site.
- Use free and/or paid website scanning services. StopBadware does not currently recommend or endorse such services, but our community can point you to their preferred scanning tools. Several scanners and other tools are listed on our Additional Resources page.
- Use a file viewing tool to help you look for suspicious content. One of StopBadware's community forum moderators has a free file viewer that helps site owners identify malicious redirects.
- Hire a professional. If you are not confident in your ability to find and remove website malware on your own, hiring a professional website malware removal company to help you may be your best option to resolve the problem quickly. Several representatives of such companies regularly answer questions on our community forum; you can also use a search engine to find a relevant company.
- See our Additional Resources page for a list of additional articles and sources on cleaning up hacked sites.
How do I remove badware?
If you have a clean backup of your site's contents, you may be able to restore the site by re-uploading all of the site's files—including your website software (WordPress, Drupal, other). When doing this, make sure that you are using the latest version of your site's software. Be aware that you may be overwriting files that have changed since your last backup. Some hosting providers are able to assist owners of hacked sites in cleaning up or restoring their sites; to see if your host can help you, contact your hosting provider's support department.
If you do not have a clean backup of your site, manual removal of the bad code may be your best option. Once you have located the code that is causing the badware behavior, removing it can be as simple as deleting the offending code from all files in which it appears. You should be sure to check hidden files for instances of bad code, too. In some cases, the bad content may be stored in one or more database records, in which case restoring a recent backup of the database or manually editing the relevant records may be necessary.
Next steps
If you've found and removed the badware on your site, your next step is to request a review from the company blacklisting your site.
http://www.stopbadware.org/my-site-has-badware
Bookmarks