Site icon Astra Security Blog

Hostgator Account Suspended – Hostgator Malware Scanner & Removal

Hostgator is one of the leading web hosting platforms. While Hostgator claims 99.9% uptime to its customers, there are times it takes certain websites down. If you have recently had your Hostgator account suspended, you might be wondering why it happened and what to do now, this post has your answer.

Before we start dissecting the problem, here’s how a HostGator account suspension message looks like:

There could be many reasons behind the HostGator account suspended message. Payment failure, server overload, malware, phishing content, malverts, and so on. In order to unsuspend your website, you will have to identify the issue first and then work to solve it. In case of a malware attack, malverts, phishing & spam content on your website, a Hostgator malware removal becomes necessary.

We will discuss this in detail later in the post, but if you’re really short of time the following infographic gives you a rough idea of how you go about the Hostgator malware removal process.

Hostgator Malware Removal: Symptoms of Malware Infection

Hostgator Malware Removal: Causes of Malware Infection

Hostgator SQL Injection

SQLi is one of the most common vulnerabilities caused due to the buggy code of your website’s files. This attack affects the database of your Hostgator site. If you use the Linux hosting then, MySql is likely to be targeted and in case of Windows hosting, MS SQL. However, users with a Windows hosting plan +-*can also use MySql in Hostgator. So, by successfully exploiting an SQL, the attackers can :

Using this reverse shell, the attackers can infect your site which would then need a comprehensive Hostgator malware removal.

Hostgator Cross-Site Scripting

An XSS vulnerability occurs due to lack of input sanitization in the web pages of your Hostgator site. Attackers can use this XSS vulnerability to inject Javascript or HTML into the web pages of your site. Successfully exploiting this, the attackers can:. However, users with a Windows hosting plan +can also use MySql in Hostgator. So, by successfully exploiting an SQL, the attackers can :

Hostgator Remote Code Execution

An RCE vulnerability can allow the attackers to run arbitrary code on the Hostgator server. This vulnerability also is caused due to buggy coding which allows unsanitized user input. Exploiting this, the attacker can run dangerous functions like eval() on your Hostgator site. Moreover, RCE can be used to silently install malware. The security mechanism of Hostgator might pick this up and suspend your site for malware infection. Hostgator malware removal may become more tricky if the attackers include backdoors via RCE to reinfect the site.

Hostgator Social Engineering Attacks

Did you receive an email or call from a person claiming to be a Hostgator employee and asking for your account details? Such scams are prevalent. Hackers often try to lure you into directly giving away your details or installing some trojan horse. Moreover, the attackers can trick you into clicking links which install the malware in the background without your knowledge which are known as drive-by downloads.

Zero Day Vulnerabilities

While hosting your site on Hostgator, you may use certain software like WordPress, Apache, etc. At times, attackers uncover flaws in popular software before their patches are released. These vulnerabilities are known as zero-day flaws. If this is causing malware infection on your site, Hostgator malware removal may become difficult. So, the best protection against such unseen flaws is a firewall or security solution.

Hostgator Server Misconfigurations

1. Open Ports

It is quite possible that some services running on particular ports of your Hostgator site are vulnerable. If you are using the shared servers of Hostgator, there is not much to worry as the Hostgator firewall blocks most of the ports for security reasons. However, while using the VPS servers of Hostgator, there is no such limitation. You are the ultimate owner of that web space. So, while configuring the server some ports may be left open which can cause trouble. Attackers can use these open ports to install the malware in your site.

2. Weak File Permissions

Your files are crucial for the operation of the site on Hostgator. Therefore, if the permissions are not set properly, the attackers can use those privilege to access sensitive files like .htaccess. The attacker can then modify these files to inject malware in your Hostgator site.

3. Clear Text Passwords and Other Sensitive Information

The server may contain some sensitive info hidden in files like robots.txt. At times, there might be some hard-coded default passwords being used for some services. Moreover, the cleartext passwords may be hidden on your server in the following files:

Apart from this, if the directory indexing is enabled, the attackers can browse all these sensitive files easily. This gives the attackers the ability to see the source code of all your web pages and scan them for vulnerabilities. All this info can be used to break into your Hostgator site and install a backdoor. This backdoor can reinfect the site even after a Hostgator malware removal.

Hostgator Malware Removal: Cleanup

The best thing to do after the malware infection is to restore your Hostgator file from backup. However, if you don’t have one, Hostgator can provide you for a certain amount of money. Otherwise, you can start the Hostgator malware removal process by inspecting the file system. Check the source code of sensitive files like index.php, .htaccess, php.ini, etc. In all such files look for some code which is doing something unexpected, the code which is encoded in base64 format and the code with FOPO obfuscation. In case you are not sure about something, just comment it out instead of deleting that part of the code. Alternatively, all the files containing base64 encoding can be uncovered in one go via the following command on SSH:

find . -name “*.php” -exec grep “base64″‘{}’; -print &> code.txt

After this command is executed, all such code will be printed to a code.txt file. From here on, decode this using online services. As far as FOPO code is concerned, it is not easily detectable to average users so consult experts. Hostgator provides you with a great tool known as phpMyAdmin. This tool can also help in Hostgator malware removal. Use this tool to search for malware in the database or even the server files.

Hostgator Malware Removal: Secure Practices

When all this is done and the Hostgator malware removal is complete, don’t forget to contact them and get your site restored.

How to clean malware from your website

Hostgator Scanner

After Hostgator has suspended your account due to malware, you can ask for a root analysis from them. And if it has found the reason for your site getting hacked, it can reveal it to you against a fee. This way you can know the reason and begin your Hostgator malware removal promptly.

Astra provides robust Hostgator malware scanner for prices as low as $24. Astra does not only scan but also protects your Hostgator site actively using its firewall. It is an out of the box solution and is simple to use and saves you a lot of time and resources.

It is one small security loophole v/s your entire website or web application

Get your web app audited with Astra’s Continuous Pentest Solution

.

Exit mobile version