Internet criminals use falsified login pages on hacked websites to steal access details that allow them to log into online accounts, for example on social media, e-banking or shopping sites. Making use of a stolen identity, they have full access to the services that person has subscribed to, and they take advantage of this to carry out fraudulent transactions at the victim’s expense.
Identifying website manipulation
Phishing websites look so much like the originals they are copying that it is easy to be fooled. We advise experienced IT users to search for phishing folders on their website if they have any reason to be suspicious. To do this, you should open your website using the FTP address rather than the browser.
Cleaning up manipulated websites
If your website has been infected, seek professional assistance immediately from your hosting provider or your webmaster. Phishing folders must always be removed or blocked. Take a look at our five tips to see how you can identify and remove further vulnerabilities.