[Systems] Fwd: Hacked content detected on http://www.sugarlabs.org/
Bernie Innocenti
bernie at codewiz.org
Sun Oct 11 23:22:44 EDT 2015
Can someone look into this to see if our ancient website really is serving "hacked" content?
-------- Original Message --------
From: Google Search Console Team <sc-noreply at google.com>
Sent: October 6, 2015 5:47:40 PM EDT
To: bernie.codewiz at gmail.com
Subject: Hacked content detected on http://www.sugarlabs.org/
Message type: [WNC-633200]
Search Console
Hacked content detected on http://www.sugarlabs.org/
To: Webmaster of http://www.sugarlabs.org/,
Google has detected that your site has been hacked by a third party who
created malicious content on some of your pages. This critical issue
utilizes your site's reputation to show potential visitors unexpected or
harmful content on your site or in search results. It also lowers the
quality of results for Google Search users. Therefore, we have applied a
manual action to your site that will warn users of hacked content when your
site appears in search results. To remove this warning, clean up the hacked
content, and file a reconsideration request. After we determine that your
site no longer has hacked content, we will remove this manual action.
Following are some example URLs where we found pages that have been
compromised. Review them to gain a better sense of where this hacked
content appears. The list is not exhaustive.
http://git.sugarlabs.org/python-xkb/mainline/commits/35bdff6
http://meeting.sugarlabs.org/publiclab/meetings
http://meeting.sugarlabs.org/sugar-meeting/2015-06-07
Here's how to fix this problem:
1
Check Security Issues for details of the hack
Use the examples provided in the Security Issues report of Search Console
to get an initial sample of hacked pages.
Security Issues
2
Look for other compromised pages or files on your site
Be sure to check your entire site, including the homepage, for any
unfamiliar content that could have been added. The malicious code might be
placed in HTML, JavaScript, or other files on your site. It can also be
hidden in places you might overlook, such as server configuration files
(eg .htaccess file) or other dynamic scripting pages (eg PHP, JSP). It's
important to be thorough in your investigation.
3
Use the Fetch as Google tool to isolate the malicious content
Because some pages can appear one way to a user and another way to Google
crawlers, you can use the Fetch as Google tool to reveal some kinds of
hacking. Enter URLs from your site in the tool to see the pages as Google
sees them. If the page has hidden hacked content, the tool can reveal that
content.
Fetch as Google
4
Remove all malicious content
You can also contact your hosting provider and ask them for assistance. If
you're having trouble identifying and removing all the content on your site
that is compromised, consider restoring an older backed-up version of your
site.
5
Secure your site from any future attacks
Identify and fix vulnerabilities that caused your site to be compromised.
Change passwords for administrative accounts. Consider contacting your
hosting service to get help with the issue.
6
Submit a reconsideration request
Once you fix your site, file for reconsideration to remove this manual
action. Include any details or documentation that can help us understand
the changes made to your site.
Reconsideration Request
Need more help?
• Read our guide for hacked sites.
• Learn how to use the Fetch as Google tool in our Help Center.
• Learn more about reconsideration requests in our Help Center.
• Ask questions in our forum for more help - mention message type
[WNC-633200].
Google Inc. 1600 Amphitheatre Parkway Mountain View, CA 94043 | Unsubscribe
Add partners who should receive messages for this Search Console account.
--
Sent from my Android device with K-9 Mail. Please excuse my brevity.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sugarlabs.org/private/systems/attachments/20151012/39260476/attachment.html>
More information about the Systems
mailing list