MALWARE, HACK SCANNING AND RESTORATION SERVICES

Comprehensive Virus and Malware Removal

  • We will copy your account to our mirror server and scan your account for malicious attack patterns. Our scanner is capable of identifying more than 6,000 exploit fingerprint.
  • We will run a comprehensive scan your files for any expression match of malwares, virus, attacker’s signature.
  • We will scan your database for any expression match or exploit finger print.
  • We will scan your directories for malicious symlinks.

 

NOTE:

  • This is recommended if you want 99% malware identification.
  • We will be needing your control panel login credentials as well as MySQL login
  • We will copy your account to our mirror server and scan your account for malicious attack patterns. Our scanner is capable of identifying more than 6,000 exploit fingerprint.
  • We will run a comprehensive scan your files for any expression match of the attacker’s signature.
  • We will scan your database for any expression match or exploit finger print.
  • We will scan your directories for malicious symlinks.

Manual Malware Scan

  • We will manually scan your files for any expression match of the attacker’s signature.
  • We will manually scan your database for any expression match or exploit finger print.
  • We will manually scan your directories for malicious symlinks.

 
NOTE:

  • This is useful if for any reason, you don’t want us to copy your account to our server.
  • We will be needing your control panel login credentials as well as MySQL login credentials to manually scan files and database in the system.
  • Shell access is not mandatory but will help us scan your files more effectively
  • Manual inspection is less effective in identifying vulnerabilities and malwares that have been injected.

 

Account Restoration

  • We will clean malwares fingerprint and files with attackers signature
  • We will restore infected files or website either from backup or attempt to recreate any damaged file.
  • We will fix database malware injection.
  • Reports will be submitted to webmaster / website owner on files and database records that we restored

 
NOTE:

  • iConcept doesn’t guarantee that damaged file, database can be restored with 100% accuracy. If file or database is damaged beyond repair, iConcept reserves the right to bill a reasonable amount to customers for restoring a page, database entries or entire website.

 

Website / Content Management System Security Hardening

  • We will perform combination of the following hardening tweaks when applicable and if necessary.
    • Login credential strengthening
    • Captcha plugin integration
    • File and Directory permission security tweaks
    • .htaccess security tweaks
    • Special directory and file protection, i.e. wp-admin, administrator, configuration.php
    • Robots.txt tweaks
    • Configuration file security tweaks
    • CMS security tweaks and security plugin installation for WordPress, Joomla, Drupal and other open source CMS.
    • Renaming admin accounts
    • Hiding admin URL
    • Setting periodic backup
    • SQL injection vulnerability evaluation ( This process requires reprogramming of some scripts or entire CMS. We will evaluate if a website is vulnerable to SQL injection and give recommendation. SQL vulnerability fix must be quoted separately. Please click GET A QUOTE to request a quotation on comprehensive SQL injection protection.)
    • If account is not hosted by ZOOM Hosting, iConcept will give server security tweak recommendation, i.e. firewall installation and configuration recommendation, Anti-DdoS, FTP Hardening, TMP Directory Hardening, Brute Force Detection, etc.
    • We will provide free hosting account migration if you so decide to transfer your hosting services to ZOOM HOSTING. For low to moderate traffic CMS-based websites like yours, we would like to recommend CLOUD-BIZ found under CLOUD-BUSINESS packages found in this link:
      https://www.zoom.ph/shared-business-cloud-hosting.php
    • For high traffic, e-commerce and portal type websites, we would recommend our ENTERPRISE-CLOUD packages.
      https://www.zoom.ph/shared-enterprise-cloud-hosting.php
    • Accounts hosted by ZOOM.PH automatically qualifies for website hack protection and website restoration services

 
NOTE:

  • Hardening modification
  • Hardening implementation may vary depending on operating system, scripting platform, database and CMS structure.
  • Shell access is not mandatory but will help us scan your files more effectively

Manual inspection is less effective in identifying vulnerabilities and malwares that have been injected.