While surfing the Internet, you may see Google’s warning message: \
Intentionally or unintentionally hosting purchase pages on your website. The front end of the website is infected by malicious code and redirected to the garbage site. This is a website that creates hidden backdoor code or script, and Google misinterprets it. Websites may tend to steal malicious backlinks or sensitive user information. There is a possibility of credit card theft software on websites (such as payment and settlement pages). This is to steal credit card data and send it to malicious intruders. Modify the advance warning information of Google fraudulent websites
Advance warning of fraudulent websites only means that an attacker has damaged your website and is likely to use it for phishing. In other words, we provide a fake page to trick visitors into disclosing credentials, credit card information and other important information. It is then sent to the attacker of the shadow server. Step 1: the first and most important step is to find the location of the infection in order to modify the advance warning of the \
1.1 Using manual search manual search requires expertise and dictionary knowledge to detect malware, so this is not an ideal way to detect malware, but it will be a good start if you are familiar with the website. Start, ignore warnings, and access websites from other devices. Now, right-click outside the element and select the view page source option to view the site source. This opens the source code for the page in a new tab. Here, look for suspicious third-party JavaScript files, iframes, HTML tags, or other seemingly abnormal elements loaded on the page. Please write it down. Now, open the file manager of the server to view the file source code of the malicious code. During manual search, other resources that need to be checked to modify fraudulent site warnings include: The
Any recently installed new themes or plug-ins. There is an unknown web administrator on the dashboard. New administrator or user in the database. A new file with a unique name or a Base64 encoded character. To view the recently modified files (for example, 30 days), log in to the server through SSH, and then execute the following command: Find- In type f-mtime30, change the value according to the number of dates required in 30. It is worth noting that some files will be automatically modified by the system. Therefore, before deleting these files, you must check the files again for malicious software. The
1.2 Using the malware scanner website, you can use various free online tools and malware scanner plug-ins to find infected pages at one time. This is also the fastest way to detect all infected pages and files on the website. Astra security’s malware scanner is one of the best products on the market.