CONTACT
PHONE telephone

    Almost done...

    Room for
    details

    Let's go

    Accept the terms

    Let's go
    ONELINE web development agency hack attack
    | | 5 min

    Tips from a web development agency for protection against hacker attacks

    A not small part of daily life is now taking place online. Users visit websites with information and many a person browses the online shop for the latest offers. Others are on social networks and almost all media companies are on the hunt for new customers. Many companies use, on the other hand, cloud services and online banking. The world could be so beautiful if it weren’t for the unnoticed permanent threat of hacker attacks. Some of you will certainly ask yourself, what do they actually want? How to implement an effective protection and what a web development agency can do, all about this in the following article.

    A short review of a major hacker attack

    The year is 2001 and a Trojan named NIMDA is making a name for itself. Computer magazines write whole pages full and network administrators spend sleepless nights. Because NIMDA does not destroy any hardware and does not steal any bank data. Instead, it places itself unobtrusively on unsecured web servers and websites. Its function was as simple as it was ingenious. The program opened up complete access for everyone. NIMDA was distributed in a very structured way across all countries. The name of the Trojan read backwards is ADMIN.

    One of the most effective botnets of its time was created. A lot of people earned money with it. Countless databases, addresses and data stocks flooded the networks and hardly anyone knew the recipient address. But getting rid of this Trojan was easy. Just simply delete the program. The way it works is certainly familiar to many. As unpleasant as a hacker attack is, the technology behind these small programmes is often also in our smartphones and desktop computers.

    Notice a hacker attack on your website

    Every software and website has its vulnerability. Whether a content management system such as WordPress or Typo3 is used or there are incorrectly configured access restrictions within the website. Hackers take all this into account. Moreover, such attacks are planned and often differentiated. For example, hacked websites contain different malware than online shops.

    Behaviour of an attacked website

    Here the website visitor is often directed to other websites or a pop-up window opens with a warning and a rule of conduct. If the user follows the instructions, the computer, smartphone or tablet is the focus of the attacker. In the meantime, search engines also recognise the placed attack and warn the user with a security note about a possible threat situation.

    Behaviour of a hacked online shop

    In this case, the malware behaves inconspicuously in the background. This is because this is a matter of tapping money. Depending on the area in which the malware is stored, the search engine cannot detect it. However, there are always indications that something is wrong. If the website display suddenly becomes very slow or unexpected browser windows open, then caution is advised. The same applies to the payment of the payment amount. If you shop at a Swiss online shop and the bank account is on the other side of the world. Then everyone should write to the operator of the shop and ask whether this is correct.

    The responsibility of the website operators

    For a long time, website operators were not held liable if their website was hacked. This attitude has now been completely changed by the judiciary. If there is malicious software on a website that causes damage to another person, the website operator is liable. The argument of cluelessness regarding the setup and configuration of a website no longer goes to court. Unless the attack took place internally at the web host and then spread to the hosted websites.

    Given the numerous hacker attacks on websites and the lack of knowledge of the website operators. it is a good idea to entrust the installation and maintenance of a website to professionals. A web development agency such as ONELINE Marketing in Switzerland is available for this purpose.

    Tips to protect a website and an online shop

    Of course, there are software security programs for websites. However, these have one fundamental disadvantage. Due to the permanent protection, accesses is slower then normal. In addition, it depends on the software used, which is responsible for the presentation of the website. Meanwhile there are installations of content management systems (CMS) like WordPress, Joomla! or Typo3 on countless pages. It is particularly important here to prevent access to databases.

    Important tips for the security of Content Management Systems

    For many years, CMS based websites have enjoyed growing popularity. The installations have been rising rapidly for years and with it the danger of targeted hacker attacks. Because the weakness of one website is also the weakness of the other website. A web software such as WordPress already has more than 2,000 files and 250 folders in its initial installation. If the authorisation is incorrect in just one place, this is a gateway for hackers.

    A further target of attack is the access data to the SQL database. These data are not only in WordPress in plain text in the root directory of the website. It is the well-known configuration file wp-config.php. Therefore, it is important to outsource the access data. For this purpose a text string with a pointer is set in the file where the configuration data can be found. The location of the file has to be chosen so that it is one level higher than the root directory. Furthermore the maxim to get plugins and themes only from trustworthy sources applies.

    For checking the correct permissions, extensions are available that check a WordPress installation. A further security risk is the file wp-login.php. The website administrator normally uses this, to access the WordPress backend. However, this file is also repeatedly the focus of hackers. A remedy is to rename the login file. Simply give it a fantasy name, such as 12345.php, and rename the wp-login.php. Then open the file with an editor and call the “search and replace” function. It will now search for wp-login.php and replace it with 12345.php. Then just save the file and there is one problem less. These problems are sometimes difficult to read by yourself, because that’s what a web development agency like ONELINE is for.

    Important tips for securing entire websites, folders and files

    The .htaccess file is one of the most powerful tools available to defend against hacker attacks. However, the file content must contain error-free configuration instructions. The .htaccess determines who has the allowance, to access which contents and files. The list of instructions which can be set in an .htaccess file is long. But often only one line instruction is enough to protect a whole folder. Content management systems such as WordPress also store lines of code here. Furthermore whole IP address spaces can be excluded from page access. This is always useful if a hacker attack carries out his attack from a constant IP address. Furthermore, a web development agency, such as the agency ONELINE, can be obtain these informations.

    Important tips for securing an online shop

    Depending on which shop software is in use, different security strategies must be implemented. Pay special attention to free shop offers. As with the CMS versions, the access data to the MySQL database is stored in files. A good shop software distinguishes itself by the fact that the software package contains instructions on the access authorisations to be granted.

    Detect and fix website manipulation after a hacker attack

    A hacker attack always leaves its mark. If a website suddenly exhibits strange behaviour or unsolicited advertising windows appear, it is likely that a program code has been inserted into a file. This often small program code is then either at the beginning or the end of the program file. Experts see this at a glance. It is then necessary to immediately check all the files available on the web space and, if necessary, connected databases. The next step is to investigate how the code was inserted. Of course, change all access data  immediately. If a code has been infiltrated, it is often sufficient to delete it from the file.

    Choosing the right web host

    The cheapest offer from a hoster has not always the necessary security mechanisms.  Especially in the business sector, monitoring systems for monitoring website access are installed in addition to the web software. For this purpose, certain prerequisites are necessary, which relate to storage space and access authorisations, and in individual cases a change in the DNS is also possible.

    Smaller companies, on the other hand, often do not have the resources for effective website setup and monitoring. Service providers such as ONELINE, a web development agency in Switzerland, take care of these problems. The staff is trained accordingly and have expertise in setting up and securing a website.

    Even if a hacker attack has a certain charm, almost all attacks have only one goal: to make money to the detriment of a third party.

    Share this article

      Sign up for our newsletter

      Cookies

      We use cookies to ensure the best possible experience for you and to make our communications with you relevant. Learn more

      accept