Hacked Website Report 2016 – Q2


UGNN Net security You may remember that a few months ago we passed along the first quarterly report on hacked websites. Based on the data gathered last quarter and the insights from the community on the first report, the Sucuri Remediation Group now releases the second report. Based on what’s been happening to the UGNN site, this report is dead on.


This report is based on data collected and analyzed by the Sucuri Remediation Group (RG), which includes the Incident Response Team (IRT) and the Malware Research Team (MRT). It analyzes over 9k infected websites and shares statistics associated with:

  • Affected open-source CMS applications
  • Details on the WordPress platform
  • Blacklists flagging the hacked site
  • Malware families and their effects

Sucuri analysis shows that SEO spam continues to be a go-to for attackers, with a 6% increase over Q1. In total, 38% of sites had some form of SEO spam injection. Backdoors continue to be one of the many post-hack actions attackers take, with 71% of the infected sites having some form of backdoor injection.

This report will provide trends based on the CMS applications most affected by website compromises and the type of malware families being employed by the attackers. Additionally included new data points around the number of websites blacklisted during the remediation phase and additional details into the makeup of the WordPress platforms.

View and download the report : Sucuri-Hacked-Website-Report-2016Q2.pdf

Net Neutrality - keep the internet free

GO GO : More Safe Netting coverage from UGNN

Thanks for reading . . .
      +FredShowker, or @Showker

GO www.facebook.com/groups/UGNet/

GO Join / Like / contribute : UGNN FaceBook Group, (ug.netnews)

avoid, beware click bait

Leave a comment

You must be logged in to post a comment.