Anti-hack service

Many people think of a hacker as some sort of bedroom based geek who has nothing better to do than cause mayhem, and some are, but in most cases this is far from true. Hackers are often large groups of people employed to to get information, they work from modern office blocks in countries far away and are paid on results. Some work for organised criminal gangs to gain access to sensitive data such as Credit Card numbers, email addresses and other personal data and once they get this data they sell it on to other organised crime gangs. Its big business and sadly, growing at an alarming rate and seems an accepted part of internet life that will only get worse.

hackers1

A website is made around a CMS (Content Management System) and a number of diverse components installed from a video player to a gallery, an online shop to a forum. Because a CMS is used for most of the worlds website, Hackers and Spammers target these all the time because if they can gain access into one website via a vulnerability such as an out of date or poorly written component, a quick search will turn up any number of sites with the same component installed giving them a long list of targets to hack.

Why Do They Do it?

The information is valuable for example if the spammers have a list of 10 million valid email addresses, they can sell it many times over. If they can find vulnerable sites to spam from and infect others, the returns can be huge. Lets say they gain access to your site, they can send out an offer to their email list using your website and you pay for it. Their cost is nothing to them, and after a short time once your site is blacklisted, they simply move on. If just a tiny percentage click the offer in the email they can con people out of a fortune, as well as the hackers plant malware and so have thousands of new infected systems to use.

Types Of Hacker

1) Harvester

A harvester is a computer program that surfs the internet looking for email addresses and entry points. Harvesting email addresses from the Internet is the primary way spammers build their lists and find targets. Harvesters must connect to the Internet through an IP address

2) Spam server

A spam server is the computer used by a spammer in order to send messages. A substantial percentage of these computers do not belong to the spammers themselves, but instead are "zombies" compromised by viruses or other malware.

3) Dictionary attacker

In addition to harvesting, spammers also use a technique known as a dictionary attack in order to find new email addresses. A dictionary attack involves making up a number of email addresses, sending mail to them, and seeing what is delivered. Dictionary attackers typically send emails to common usernames such as info@ sales@ Etc.

4) Comment spammer

Comment spammers do not send email spam. Instead, comment spammers post to blogs and forums. These posts typically include links to sites being promoted by the comment spammer. The purpose of these links is both to drive traffic from humans clicking on the links, as well as to increase search engine rankings which are sometimes based on the number of links to a page.

5) Exploit attacker

Exploit attackers is a computer program similar to a harvester but it hunts for known “back doors” into websites, once they find a way in to one site, they look for the other site with the same vulnerability.  90% of exploit attackers get in via out of date components.They then plant malware that can sit dormant for months, even years before they visit it to set it off. Once they set it off, it writes files on the server that attack the site, send out spam or take over what google and other search engines see. The two worst things about this is they can run it over and over again and their malicious code invites other exploit attackers and bad search engines to visit your site. These are the worst type as they are so difficult to find and remove.

Stopping Hackers

In the last 12 months there has been a huge increase in the number of scams and websites that have been hacked, its also getting more and more difficult to stop them using standard methods. In some cases its easier to get into a website than it is to keep the hackers out.

The hackers have sophisticated automatic robots that crawl the internet looking for targets posing as search engines, and once they are set running they work 24/7 with no need for rest or further action from the hacker himself. These robots visits sites and list the contents but they also records easy targets for the hackers to attack. These hackers are not stupid and once they gain access they plant a doorway so they can get in at anytime in the future. They don’t do damage or show themselves straight away. In 2012 over 5 million website were hacked on a single day with them all suddenly showing up as selling Viagra on Google. If you removed the hacked files they would reappear 20 minutes later. The IP used was found to be in China and the hackers had been working unseen on this for over a year with the hacked files laying dormant for months. All they did was visit the file remotely and the hack was started.

Once a site with a vulnerability is found by the hackers robot crawler, the vulnerability is listed and stored for later attack, however if your site has no vulnerabilities, the robot crawler cannot find a way in, so you might think it will leave it alone. No, once on the list they will try again and again so be aware new vulnerabilities are found everyday and be assured they will be back again and again to check after all it’s a machine thats checking not a human.

Think of it a bit like opportunistic burglars who walk down a street several times a day, looking for open windows. They walk past the house with CCTV, an alarm box, security lights and a huge dog barking inside because they know there will be an easier target just down the road. 

If you currently have a website hosted on our servers or are thinking of having one, we would like to go through the anti-hacker and spam stopping systems we have.

So what can we do?

Firstly, we are lucky that everything you do on the internet leaves a trail, your IP address is recorded every step you make, and the same happens with the hackers. Hackers try to get round this by having hundreds of IP addresses.

Over the past few years we, along with many others, have been recording any IP addresses that has been used to try to gain access to gain access to our hosted sites. We can block local and international IP addresses and recent developments mean we can now block them automatically from your website using a world wide master list.

Hackers also use signature codes added to the website address normally starting with a question mark. Over 300 regular hack calls have been recognised and recent developments mean we can look out for these being used and either ban the users IP address or remove the code as its added. We can also do this on signatures entered into online forms.

Once they gain access to the site hackers upload files that contain malicious code hidden in files that are not what they are supposed to be such as Hacks named as images but recent developments mean we can monitor these and remove them before they do any damage.

Recent developments allow us at Ellmore Digital to be able to offer a series of options to keep the hackers away and use a website anti-virus to fix issues should they get through.

 

Option 1: No Support - FREE

  • No support - Basically you are on your own and we don't monitor your  website. Once you go live we do nothing and if your website is hacked, sorry to say, its down to you to fix it.
  • We will warn you about components hat need updating and component updates can be installed for £25 each on request.
  • We will try to help in any way we can but any work we do is charged at our normal hourly rate.
  • Option 1 is for people who dont even run anti-virus software on their PC and don't mind risking losing everything in the event of a problem.

 

Option 2: Basic support - £100 Per Year Per Site (£250 for Ecommerce Sites)

Includes:

  • Free use for all queries via our ticket system.
  • We will update components when they become available for no charge.
  • We add a list of all Blacklisted IP addresses that we have seen to try to hack any of our websites. This list does not allow anyone using these IP addresses to visit it our servers whatsoever.
  • If a known hacker attempts to visit your site using any one of the thousands of black listed IP addresses they are automatically blocked so cannot view or do anything on your website. The list of blocked IP's is held and updated by a world wide group of anti-hack specialists all working together to keep the list up to date. A list of the IP’s blocked is available to you to view and be assured, once you see the list you will simply be amazed how many attempts there are.
  • If the hackers get in we can reinstall the site to the last backup taken.

 

Option 3: Advanced Support - £50 per month

This is our full multi-level monitored anti-hack service with the highest level of security we can give. Our system sits silently viewing every person that comes on your website.

First it uses our IP blocker to stop all Black listed IP addresses. If a known hacker attempts to visit your site using any one of the thousands of black listed IP addresses they are automatically blocked so cannot view or do anything on your website. The list of blocked IP's is held and updated by a world wide group of anti-hack specialists all working together to keep the list up to date. A list of the IP’s blocked is available to you to view and be assured, once you see the list you will simply be amazed how many attempts there are.

After this it watches what visitors type, looking patterns which are commonly used as suspicious hack calls such as someone trying to gain access to your site. It uses a score system and if what a visitor types scores high, the system sees the visitor as trying to gain entry using suspicious code the code will be remove and their IP address recorded and monitored.

If the system sees the same IP address try again it will automatically ban the IP address and email and warn us.
The system also stops the entry of suspicious calls into forms on your website
The system also stops the upload of malicious code hidden in images and other uploads.
The system also does several other secret anti-hack tasks.
We run website anti-virus just in case they had been in before the system was activated or when we think there is a problem.

Also Included:

  • Free use for all queries via our ticket system.
  • We will update components when they become available for no charge.
  • If the hackers get in we can reinstall the site to the last backup taken.

 

Service

Option 1

Option 2

Option 3

Use of ticket system

FREE

FREE

PRIORITY

Support

CHARGE

FREE

PRIORITY

Component update needed warning

FREE

N/A

N/A

Update CMS and components

CHARGE

FREE

PRIORITY

Single Backup

N/A

FREE

 

Regular Backup (at least monthly)

N/A

OPTIONAL

FREE

Backup on change made

N/A

OPTIONAL

FREE

Restore backup

N/A

CHARGE

FREE

Local IP black list blocking

N/A

FREE

FREE

World IP black list blocking

N/A

FREE

FREE

Viewable list of blocked IP’s

N/A

FREE

FREE

Monitor visitors IP’s during visit.

N/A

OPTIONAL

FREE

Remove entered malicious code

N/A

OPTIONAL

FREE

Record IP’s using malicious code

N/A

OPTIONAL

FREE

Dynamic IP banning for offenders

N/A

OPTIONAL

FREE

Dynamic scoring system

N/A

OPTIONAL

FREE

Stop malicious code in form entry

N/A

OPTIONAL

FREE

Stop malicious code in uploads

N/A

OPTIONAL

FREE

Secret anti-hack functions

N/A

OPTIONAL

FREE

Website virus removal

N/A

OPTIONAL

FREE

Remove malware

N/A

CHARGE

PRIORITY

Hack removal

N/A

CHARGE

PRIORITY

 

How Important Is Your Website To Your Business?

Websites are treated a bit like a business electricity supply. While its connected, its out of sight out of mind. Just think of the mayhem if your electricity supply went off for weeks, well its the same if your website goes down for any reason.

If your website is an essential part of your business, we ask that you cover yourself with the level of cover that is correct for you today.

web-UKWDA
Part Of Ellmore Group
ellmore-group
facebook twitter youtube linkedin This email address is being protected from spambots. You need JavaScript enabled to view it. google

Copyright © 2016 Ellmore Digital.
 All Rights Reserved.
Registered Company No: 6682116