Akhil Bhartiya Cyber Suraksha Sangathan (Regd.)
Regd. with Registrar of Society of NCT Delhi-Regd. No-287
Cyber Criminals se Suraksha, Digital India ki Raksha
अखिल भारतीय साइबर सुरक्षा संगठन (पंजी)
भारत की पहली साइबर क्राइम इन्वेस्टीगेशन एन जी ओ
ऑनलाइन रहें सतर्क, साइबर अपराध से रहें सुरक्षित
www.abcss.org Email: info@abcss.org
AMIT MALHOTRA
(Cyber Crime Investigation Specialist)
Founder Akhil Bhartiya Cyber Suraksha Sangathan
18 years of experience in crime prevention, detection and investigation. Certified Ethical Hacker from EC-Council. Certified Cyber Crime Investigator from Asian School of Cyber Laws. Presently working in the area of cyber crime investigation.
// COMMON WEBSITE HACKING METHODS (All Are Criminal Offences): SQL Injection: ' OR '1'='1 ← Bypasses login, dumps entire user database Brute Force: Trying "admin/123456", "admin/password" on login page ← Weak password attack WordPress plugin exploit: Outdated plugin with known CVE vulnerability ← Unpatched CMS attack File Upload Bypass: Uploading malicious PHP shell as "image.php.jpg" ← Shell injection XSS Attack: Injecting <script>document.location='attacker.com'</script> ← Session hijack Defacement: Homepage replaced with hacker's political message/flag ← Website defacement // HOW WEBSITE OWNERS CAN PROTECT THEMSELVES: ✔ Keep CMS (WordPress/Joomla), plugins, and themes fully updated at all times ✔ Use strong, unique passwords + Two-Factor Authentication on all admin panels ✔ Install a Web Application Firewall (WAF) — Cloudflare, Sucuri, or ModSecurity ✔ Take daily encrypted backups stored separately from the hosting server ✔ Install an SSL certificate (HTTPS) and conduct regular security audits ✔ Restrict file upload types and validate all user inputs on your web forms
⚠️ How Website Hacking Is Carried Out
- SQL Injection — inserting malicious database commands through vulnerable web forms to extract or destroy data
- Brute Force attacks — automated tools trying thousands of username and password combinations on admin login pages
- Cross-Site Scripting (XSS) — injecting malicious scripts into web pages viewed by other users to steal sessions or redirect traffic
- Exploiting unpatched vulnerabilities in CMS platforms like WordPress, Joomla, or Drupal
- Uploading malicious web shells through insecure file upload functionalities on the website
- Phishing the website administrator to steal hosting panel, FTP, or CMS credentials
- Cross-Site Request Forgery (CSRF) — tricking an authenticated admin into unknowingly executing malicious actions
- Man-in-the-Middle (MITM) attacks on unsecured HTTP connections to intercept login credentials
- Compromising the web hosting server through vulnerabilities in shared hosting environments
- Stealing FTP or cPanel credentials through malware on the website owner's computer
✅ How to Protect Your Website
- Keep your CMS, all plugins, themes, and server software fully updated at all times
- Use strong, unique passwords for the admin panel, FTP, cPanel, and database accounts
- Enable Two-Factor Authentication (2FA) on all admin and hosting control panel logins
- Install and configure a Web Application Firewall (WAF) — Cloudflare, Sucuri, or ModSecurity
- Use HTTPS — install a valid SSL certificate and force all traffic over HTTPS
- Take daily encrypted backups and store them separately from your live hosting server
- Scan your website regularly with security tools — Wordfence, Sucuri SiteCheck, or OWASP ZAP
- Limit login attempts and block IP addresses after repeated failed login tries
- Validate and sanitise all user inputs on web forms to prevent SQL Injection and XSS
- Conduct regular security audits and penetration tests by certified ethical hackers
Reconnaissance — Gathering Information About the Target
The hacker begins by collecting as much information as possible about the target website — the technology stack (CMS, programming language, server type), domain registration details, IP addresses, subdomains, and publicly accessible files. Tools such as WHOIS lookups, Google dorking, Shodan, and website technology fingerprinting tools are used to identify potential weaknesses before a single attack packet is sent. This stage is entirely passive and leaves no trace in the target's server logs.
Scanning — Finding Vulnerabilities
Using automated vulnerability scanners — such as Nikto, OWASP ZAP, Nmap, or WPScan for WordPress sites — the hacker scans the target website for known security weaknesses: open ports, outdated software versions with known vulnerabilities (CVEs), misconfigured server settings, exposed admin panels, weak authentication mechanisms, and insecure file permissions. This stage identifies the specific entry point that the hacker will exploit in the next phase.
Gaining Access — Exploiting the Vulnerability
The hacker exploits the identified vulnerability to gain unauthorised access to the website or its backend systems. This may involve injecting malicious SQL commands through a vulnerable contact form, uploading a PHP web shell through an insecure file upload function, using stolen or brute-forced credentials to log into the admin panel, or exploiting a known security flaw in an unpatched plugin or CMS version. At this point, the hacker has a foothold inside the website.
Maintaining Access — Establishing Persistence
To avoid losing access if the initial vulnerability is patched, the hacker installs a backdoor — a hidden web shell, a rogue administrator account, or a malicious plugin — that allows them to return to the compromised website at any time, even after the original entry point is closed. These backdoors are carefully hidden in obscure directories, disguised as legitimate system files, or encoded to evade security scanners. Many website owners are unaware that their site remains compromised for months after the initial breach.
Executing the Attack — Carrying Out the Criminal Objective
With full control over the compromised website, the hacker executes the primary criminal goal — stealing the website's user database (including names, emails, phone numbers, and payment card details), defacing the homepage with propaganda or offensive content, injecting malware that silently infects every visitor's device, redirecting visitors to phishing pages or fake payment gateways, using the compromised server to send millions of spam or phishing emails, or encrypting the website's files and demanding ransom for restoration.
Covering Tracks — Hiding Evidence of the Attack
After completing the attack, sophisticated hackers delete or modify server access logs to remove evidence of their intrusion, change file timestamps to disguise newly uploaded malicious files, and use proxy servers or compromised systems as intermediaries to obscure their true IP address and location. This is why digital forensic investigation of a hacked website must be conducted by a qualified cybersecurity professional — to recover and preserve all available evidence before it is overwritten or deliberately destroyed.
SQL Injection (SQLi)
SQL Injection is one of the most common and devastating website attacks in India. The attacker inserts malicious SQL database commands through vulnerable input fields — such as login forms, search boxes, and contact forms — to manipulate the website's backend database. This allows the attacker to bypass authentication entirely, extract the complete user database (including passwords, email addresses, phone numbers, and payment card data), modify or delete records, and in some cases gain full control over the database server itself.
Cross-Site Scripting (XSS)
In an XSS attack, the hacker injects malicious JavaScript code into the website's web pages — which then executes in the browsers of other users who visit the affected page. This allows the attacker to steal session cookies (taking over logged-in user accounts), redirect users to phishing pages, capture keystrokes and form inputs, and deface the user's view of the website. Stored XSS — where the malicious script is permanently saved in the website's database — is particularly dangerous as it affects every user who visits the page.
Website Defacement
Website defacement involves an attacker gaining unauthorised access to a website and replacing the homepage or other pages with their own content — typically a political message, national flag, propaganda, or offensive imagery. Defacement attacks are frequently carried out by hacktivist groups targeting government websites, news portals, and corporate sites. In India, hundreds of government and private websites are defaced every year — damaging the organisation's reputation and causing public panic. Defacement is often the first visible sign of a successful hack.
Web Shell / Backdoor Installation
A web shell is a malicious script — typically written in PHP, ASP, or Python — that the hacker uploads to the compromised server through a vulnerable file upload feature, an exploited CMS vulnerability, or a compromised FTP account. Once installed, the web shell provides the attacker with a persistent, hidden remote control interface to the entire server — allowing them to browse, upload, download, and delete all files; execute system commands; modify the database; and install additional malware — all through a simple web browser interface from anywhere in the world.
Brute Force / Credential Stuffing Attack
In a brute force attack, automated tools systematically try thousands or millions of username and password combinations against a website's admin login page until a correct combination is found. Credential stuffing is a related attack where lists of usernames and passwords leaked from other data breaches are used to attempt login — exploiting the common practice of reusing the same password across multiple websites. Both attacks are particularly effective against websites using weak passwords, with no account lockout policy, and no Two-Factor Authentication.
Malicious Redirect / SEO Spam Injection
After gaining access to a website, hackers frequently inject hidden malicious code that redirects visitors — particularly those arriving from Google search results — to phishing websites, adult content sites, fake pharmacy websites, or malware download pages. This type of hack is especially dangerous because the website may appear completely normal to the administrator but redirects unsuspecting visitors arriving via search engines. In SEO spam injection attacks, the hacker also injects thousands of spam links and pages into the website to boost the ranking of their own fraudulent websites in search engine results.
Website Ransomware Attack
In a website ransomware attack, the hacker gains access to the website's hosting server and encrypts all website files — making the website completely inaccessible. A ransom demand is then sent to the website owner, requiring payment in cryptocurrency in exchange for the decryption key. Website owners without recent backups may lose their entire website and its data. Paying the ransom does not guarantee restoration of access. This type of attack is increasingly common against e-commerce websites and data-driven businesses in India.
Phishing Page Injection
Hackers frequently compromise legitimate, trusted websites — particularly those with established Google rankings and SSL certificates — and inject hidden phishing pages that impersonate banks, government services, e-commerce platforms, or payment gateways. These fake pages are designed to steal the login credentials and payment details of unsuspecting visitors who trust the genuine domain name. This technique allows phishing attacks to operate from trusted domains, bypassing many spam filters and user suspicion. Compromised Indian government and educational institution websites are frequently used in this manner.
🚨 IF YOUR WEBSITE HAS BEEN HACKED — TAKE THESE STEPS IMMEDIATELY
- Take the website offline immediately — enable maintenance mode or contact your hosting provider to suspend the site to protect your visitors from malware or phishing pages
- Do NOT delete any files — preserve the compromised state of all files, databases, and server logs intact as critical evidence for the cybercrime investigation
- Change all credentials immediately from a clean, separate device — admin panel password, FTP password, database password, hosting cPanel/Plesk password, and domain registrar password
- Download a complete backup of your compromised website files and database to an external drive for forensic analysis
- Contact your hosting provider's security team immediately — they may have server-level logs and tools to assist with malware identification and removal
- File a complaint at cybercrime.gov.in or call the National Cyber Helpline at 1930 — provide all server logs and evidence
- Engage a certified web security expert or cyber forensic investigator to thoroughly scan, clean, and harden your website
- If user data has been compromised, notify all affected users immediately and advise them to change their passwords and monitor their accounts for suspicious activity
- Submit a malware review request to Google (via Google Search Console) once the website is cleaned, to remove the "This site may be hacked" warning from search results
- After full recovery, conduct a comprehensive security audit and penetration test to ensure all vulnerabilities are identified and remediated before re-launching the website
📞 CONTACT IMMEDIATELY — HELPLINE NUMBERS
IT Act 2000 — Section 43A (Compensation for Failure to Protect Data): A body corporate that possesses, deals with, or handles sensitive personal data of users and fails to implement reasonable security practices — resulting in wrongful loss or gain — shall be liable to pay compensation to the affected persons. This provision is particularly relevant where a website hack leads to the exposure of user data due to inadequate security measures by the website owner.
IT Act 2000 — Section 66 (Computer Related Offences): Dishonestly or fraudulently doing any act covered under Section 43 — including unauthorised access, data theft, website defacement, virus introduction, or denial of service — is a criminal offence punishable with imprisonment up to 3 years and/or fine up to ₹5 lakh. This is the most commonly invoked criminal provision in website hacking cases in India.
IT Act 2000 — Section 66C (Identity Theft): Fraudulently or dishonestly using the electronic signature, password, or unique identification feature of another person — including stealing website administrator credentials — is punishable with imprisonment up to 3 years and fine up to ₹1 lakh. Frequently applied where hackers steal admin login credentials to gain access to websites.
IT Act 2000 — Section 66D (Cheating by Personation Using Computer Resource): Cheating any person by personating another person using a computer resource or communication device — including using a hacked legitimate website to host phishing pages that impersonate banks or government portals — is punishable with imprisonment up to 3 years and fine up to ₹1 lakh.
IT Act 2000 — Section 66F (Cyber Terrorism): Hacking into critical information infrastructure — including government websites, banking systems, power grids, hospitals, or defence systems — with the intent to threaten the unity, integrity, security, or sovereignty of India, or to cause death or damage to property — is punishable with imprisonment up to life. This is the most severe provision under the IT Act and applies to state-sponsored or large-scale organised website hacking attacks.
IT Act 2000 — Section 67 (Publishing Obscene Material in Electronic Form): Using a hacked website to publish or transmit obscene, sexually explicit, or morally reprehensible material — imprisonment up to 3 years and fine up to ₹5 lakh for the first conviction; up to 5 years and ₹10 lakh for subsequent convictions. Applies where hackers upload objectionable content to compromised websites.
BNS Section 318 (Old IPC 420) — Cheating: Using a hacked website to deceive users — such as by hosting a fake payment gateway, phishing page, or fraudulent online store on a compromised trusted domain — to fraudulently obtain money or property from victims — imprisonment up to 7 years and fine. Invoked in cases where website hacking is used as the vehicle for financial fraud against end users.
BNS Section 308 (Extortion): Hacking a website, encrypting its files with ransomware, and demanding payment for restoration of access constitutes the criminal offence of extortion — imprisonment up to 3 years, or up to 7 years if accompanied by a threat of death or grievous hurt, and fine. Applies in all website ransomware and cyber extortion cases in India.





