Skip to main content
Back to blog
April 28, 2026·Updated April 28, 2026|9 min read|Antoine Duno

Has My Website Been Hacked? 8 Signs and How to Verify Each

Eight concrete signs your website has been hacked, how to verify each one in minutes, and how to prevent the next attack with a security scan.

ZeriFlow Team

1,669 words

Has My Website Been Hacked? 8 Signs and How to Verify Each

"Has my website been hacked?" is the kind of question that strikes at 2 a.m. when you notice traffic dropping, when a customer emails you screenshots of weird redirects, or when Google sends you a notification you really didn't want to read. The answer is rarely obvious — modern attackers are quiet, and most compromises go undetected for weeks.

This guide gives you eight concrete signs of a hacked website, how to verify each one in minutes, and what to do if any of them check out. It also covers the bigger lesson: most hacks are preventable, and a security scan run a few weeks earlier would have closed the door the attacker walked through.

If you're reading this because you're worried right now, start with sign 1 and work through them in order. If you're reading this proactively, even better — most of these checks are worth doing monthly regardless.

Want to check your site right now? Run a free ZeriFlow scan in 60 seconds →

Sign 1: Unfamiliar Admin Users

Attackers who get access often create their own admin accounts as a persistence mechanism. Even if you patch the original vulnerability, they can return through their account.

### How to verify - WordPress: /wp-admin/users.php — look for any user you don't recognize. - Drupal/Joomla: equivalent admin user list. - Custom apps: query your users table for recently created admin/staff accounts. - Check admin user creation timestamps against your last legitimate change.

If you find one, don't just delete it. The attacker likely also installed backdoors elsewhere. You need a full audit, not just user cleanup.

Sign 2: Suspicious Files in Your Filesystem

Backdoors and webshells are often placed in unexpected directories — /wp-content/uploads/, /cache/, root directory — with innocent-looking names like wp-config-sample.php or index2.php.

### How to verify SSH into your server and run:

bash
# Files modified in the last 7 days
find /var/www/yoursite -type f -mtime -7 -name "*.php"

# Files with suspicious functions
grep -r "base64_decode\|eval(\|gzinflate\|str_rot13" /var/www/yoursite --include="*.php"

# Recently modified config files
find /var/www/yoursite -name "*.php" -mtime -30 -ls

Look for files you didn't put there, files modified at odd times (3 a.m. on a day you didn't deploy), or files containing heavily obfuscated code.

Sign 3: Unexpected Redirects

A common monetization for attackers is redirecting traffic to spam, phishing, or affiliate sites. Often only mobile users or specific referrers are redirected, so the owner doesn't see the issue.

### How to verify - Open your site in an incognito window from your phone, with mobile user-agent. - Try clicking through from a Google search result rather than typing the URL. - Use a tool like Redirect Detective or curl with different user agents:

bash
curl -A "Mozilla/5.0 (iPhone; CPU iPhone OS 17_0 like Mac OS X)" -I https://yourdomain.com
curl -e "https://www.google.com/" -I https://yourdomain.com

If you see 301/302 redirects to unfamiliar domains, you have an active redirect injection.

Sign 4: Unusual Search Console Errors

Google Search Console is one of the fastest detectors of a hack. Attackers create spam pages, inject content, or compromise the index in ways Google notices quickly.

### How to verify - Search Console → Pages → Indexed: look for pages you never created (often pharmacy, gambling, replica goods). - Manual Actions section: any flag here is critical. - Security Issues section: explicit warnings if Google flagged your site. - Performance → Queries: keywords you've never targeted appearing in your search impressions.

If you see indexed pages you don't recognize, view-source on them. They're usually injected by a hacked CMS or compromised file upload.

Sign 5: Browser Warnings

When users hit "Deceptive site ahead" or "This site may harm your computer," your domain is on Google Safe Browsing's blocklist. This usually happens within hours of a malware infection or phishing kit being detected.

### How to verify - Visit https://transparencyreport.google.com/safe-browsing/search?url=yourdomain.com - Check Sucuri SiteCheck for blocklist status across multiple databases. - Check your domain on VirusTotal.

If you're listed, fix the underlying compromise first, then request review through Search Console. Resolution typically takes 24-72 hours after a clean scan.

Sign 6: Sudden Traffic Drop or Spike

Hacked sites either lose traffic (Google deindexes) or gain weird traffic (the attacker is now monetizing your domain).

### How to verify - Check Google Analytics or your analytics tool for the last 30 days. - Look for sudden geographic shifts (huge spike from countries you don't serve). - Check for traffic to URLs you didn't create. - Check Search Console for impressions on unfamiliar queries.

Both directions of unexpected change are worth investigating. A 50% drop overnight is rarely organic; a 500% spike with no marketing push almost never is.

Sign 7: Hosting Provider Notifications

Many providers run their own scans and will email you about suspected malware, abuse complaints, or unusual outbound traffic. These are easy to dismiss as spam — don't.

### How to verify - Search your inbox (and spam folder) for emails from your host in the last 90 days. - Check your hosting control panel for security notifications. - Look for unusual bandwidth or CPU usage in your hosting dashboard — compromised sites are often used for outbound spam, brute force, or crypto mining.

If your hosting provider says something looks wrong, take it seriously. They see infrastructure-level signals you don't.

Sign 8: Site Performance Degradation

Many hacks add overhead — cryptominers, spam-sending scripts, redirect loops, or simply many extra files being scanned by attackers. The result: your site gets slow.

### How to verify - Compare current page load times to historical averages (Pingdom, GTmetrix, your APM). - Check server CPU and memory usage in your hosting panel. - Look for unusually large logs (access.log, error.log). - Run a packet capture or check connection logs for outbound traffic to unknown IPs.

A site that suddenly takes 3x longer to load with no changes you made is suspicious.

What to Do If Any Sign Is Positive

If even one of these checks indicates a compromise, treat it as serious:

  1. 1Take a snapshot of the current state. You'll need it for forensics.
  2. 2Restore from a known-clean backup if you have one before the suspected breach date.
  3. 3Reset all credentials — admin passwords, database passwords, API keys, FTP/SSH keys, third-party integrations.
  4. 4Run a malware scanner (Sucuri SiteCheck, Wordfence, VirusTotal) to identify infected files.
  5. 5Update everything — CMS, plugins, themes, server packages.
  6. 6Run a security scanner to find the weakness that let them in. Until you close the original hole, you'll be re-compromised within days.
  7. 7Submit for review in Google Search Console once clean.

The recovery without finding the root cause is the most common mistake. People clean malware, only to wake up the next week with the same infection through the same vulnerability.

How to Prevent the Next Hack

Most successful attacks exploit issues that a security scan would have flagged in advance. The biggest preventable weaknesses:

  • Outdated CMS, plugins, themes (especially WordPress)
  • Missing security headers (no HSTS, no CSP, no X-Frame-Options)
  • Weak TLS configuration with deprecated protocols
  • Exposed .git, .env, backup files
  • Default or weak admin passwords
  • No 2FA on admin accounts
  • Missing DMARC/SPF allowing email spoofing
  • Verbose error messages leaking stack traces

Run a comprehensive security scan now, fix the high-severity findings, and set up recurring scans. ZeriFlow's free scan covers all of these and more in 60 seconds. See our HTTP security headers guide and SSL/TLS configuration guide for detailed remediation.

The math is simple: 60 seconds of scanning prevents 20 hours of cleanup.

FAQ

### Q: How can I tell if my website has been hacked without technical skills? Start with the most visible signs: open your site in incognito on mobile, check Google Search Console for warnings, look for unfamiliar admin users in your CMS, and run a free external scan on Sucuri SiteCheck. If anything looks off, contact your host or a security professional.

### Q: How long does a website compromise typically go undetected? Industry studies put the average dwell time for small-site compromises at 30-90 days. Attackers benefit from staying hidden — the longer they stay, the more they extract (SEO spam revenue, credentials, miner output).

### Q: Will my hosting provider tell me if I've been hacked? Sometimes, but not always. Many providers detect outbound spam or malware and notify you, but they don't catch everything (especially silent SEO-spam infections). Don't rely on host detection as your only signal.

### Q: Can I recover a hacked site myself? For straightforward infections (single backdoor file, recent backup, simple CMS) yes. For deeper compromises (multiple backdoors, server-level access, no clean backup), you usually want professional help. The bigger lesson is preventing the next hack — run regular security scans.

### Q: How do I prevent my website from being hacked again? Find and fix the original vulnerability (security scan), keep all software updated, enforce strong passwords and 2FA on admin accounts, use a WAF (Cloudflare free tier works), maintain off-site backups, and re-scan weekly to catch drift.

Conclusion

The honest answer to "has my website been hacked" is usually "you'd know if you looked." The eight signs above cover the most common detectable indicators — unfamiliar admin users, suspicious files, redirects, Search Console warnings, browser flags, traffic anomalies, host notifications, and performance drops. Each one takes minutes to verify.

But detection is only half the job. The other half is prevention — and prevention is where the leverage is. Most hacks exploit weaknesses that a security scan would have flagged weeks earlier. The 60 seconds you invest in a scan today is the cheapest insurance against the 20-hour cleanup tomorrow.

Start your free security scan on ZeriFlow → — 80+ checks in 60 seconds, free for single-domain scans, and a clear report telling you which doors are open before an attacker walks through them.

Ready to check your site?

Run a free security scan in 30 seconds.

Related articles

Keep reading