What Happens When Your Agency Client’s WordPress Site Gets Hacked: A Step-by-Step Response Playbook

Published: May 11, 2026 Author: TechnoCrackers
What Happens When Your Agency Client's WordPress Site Gets Hacked A Step-by-Step Response Playbook

The call every agency dreads: a client rings to say their website is showing a warning message, their hosting provider has suspended their account, or their customers are being redirected to a spam site. The agency built the site. The agency manages the relationship. The agency is now on the hook.

How an agency responds to a client site hack determines whether the client stays or leaves — and whether the agency’s reputation survives intact. A slow, disorganised response compounds the damage. A fast, structured response becomes a demonstration of professionalism that deepens trust.

This playbook documents the exact response process Technocrackers executes as a white label partner when an agency client site is compromised — from the first alert to the post-recovery report.

The Four Stages of a WordPress Hack Response

Hack Response Overview
Stage 1: Containment (0–2 hours) — Stop the damage from spreading
Stage 2: Assessment (2–6 hours) — Understand what happened and how
Stage 3: Recovery (6–48 hours) — Clean, restore, and harden
Stage 4: Post-Recovery (48–72 hours) — Report, prevent, and retain the client

Stage 1: Containment — The First 2 Hours

The moment a hack is confirmed, the priority is containment — preventing the compromised site from doing further damage to the client’s brand, their customers, or their hosting environment.

Step 1: Take the Site Offline or Enable Maintenance Mode

If the site is actively serving malware, displaying defaced content, or redirecting users, it must be taken offline immediately. A maintenance page is preferable to a live hacked site for every minute it remains accessible.

Step 2: Change All Credentials Immediately

Reset: WordPress admin password, hosting control panel password, FTP/SFTP credentials, and the database password. Do this before any investigation — if the attacker still has credential access, any cleanup will be undone.

Step 3: Notify the Hosting Provider

Most hosting providers have a security team that can assist with server-level threat identification and quarantine. Notify them immediately and request a server-level malware scan.

Step 4: Client Communication — What to Say and What Not to Say

Agency Client Communication Script — Hack Notification
Hi [Client Name], we’ve identified a technical security issue with your website and have taken immediate action to protect it.
We’ve taken the site offline while we investigate and address the issue. This is a precautionary measure to protect you and your customers.
Our team is working on this now. We will update you within [X hours] with a full assessment and a recovery timeline.
Please do not attempt to log in to the site or change any settings until we confirm it is safe to do so.
We’ll keep you closely updated. If you have any urgent questions, contact [agency PM name] directly.

What not to say: do not tell the client how the site was hacked until you have confirmed it. Do not speculate about data loss. Do not apologise for the hack itself — apologise for the disruption and focus on resolution.

Stage 2: Assessment — Hours 2 to 6

Malware Scan

Run a server-level malware scan using a tool such as Maldet or the hosting provider’s scanner. Additionally, run a WordPress-specific scan using Wordfence, Sucuri SiteCheck, or MalCare. Document every infected file identified.

Entry Point Investigation

The single most important forensic question: how did they get in? Without identifying the entry point, cleaning up the site without closing the vulnerability will result in immediate reinfection. Common entry points to check:

  • Outdated plugin with a known CVE (check against WPScan database)
  • Compromised admin credentials — check admin user list for unknown accounts
  • Vulnerable file upload functionality
  • Server-level compromise via outdated PHP or FTP vulnerability
  • Nulled or unlicensed themes/plugins containing malicious code

Scope Assessment

Determine: which files are infected, whether the database has been modified, whether any data has been exfiltrated, and whether the site is blacklisted by Google or other security authorities.

Check Tool
Google blacklist status Google Safe Browsing: transparencyreport.google.com
Sucuri blacklist check sitecheck.sucuri.net
File modification timestamps Hosting file manager or FTP client
WordPress admin user audit WordPress admin > Users
Database integrity phpMyAdmin or WP-CLI

Stage 3: Recovery — Hours 6 to 48

Option A: Clean the Existing Installation

Appropriate when: the infection is limited to specific files, the entry point is identified and closed, and the database is uncompromised.

  1. Remove all identified malicious files
  2. Replace WordPress core files with fresh copies from wordpress.org
  3. Replace compromised plugin files with fresh downloads from the official repository
  4. Audit the database for injected content in posts, options table, and user meta
  5. Remove any unknown or unauthorised admin accounts
  6. Reinstall the security plugin with a clean configuration

Option B: Restore from Clean Backup

Appropriate when: the infection is widespread, the entry point is unclear, or the database has been significantly modified. Requires a verified clean backup — Technocrackers tests all backups monthly to confirm restore capability.

Critical: after restoring from backup, still close the entry point. A restore without patching the vulnerability will result in reinfection within hours.

Post-Cleanup Security Hardening

Security Hardening Steps After Every Hack Recovery
Update all plugins, themes, and WordPress core to current versions
Remove all unused plugins and themes — inactive code is still a risk
Implement or reconfigure web application firewall (Cloudflare or Wordfence)
Enable two-factor authentication on all admin accounts
Restrict admin access by IP address where possible
Disable XML-RPC if not in use
Implement file permission hardening (755 directories, 644 files)
Configure login attempt limiting
Submit site to Google for blacklist removal review (if applicable)
MINI CASE STUDY: UK E-Commerce Agency — WooCommerce Hack Recovery in 18 Hours
Client Type: Manchester-based digital agency managing a WooCommerce store for a UK fashion retailer (4,000+ customers, active transaction volume)
Problem: On a Wednesday afternoon, the agency received a call from the client — customers were being redirected to a pharma spam site from the product pages. The hosting provider had flagged the account for malware. Google had not yet blacklisted the site but the window was narrow. The client had approximately £8,000 in pending orders that could not process.
Technocrackers was contacted at 3:00pm. Within 30 minutes, Technocrackers had staging access and the live site was in maintenance mode.
Assessment Findings: A WooCommerce plugin (version 13 months out of date) had a known CVE that had been publicly disclosed 4 months prior. Attackers had used it to inject a redirect script into the theme’s footer.php and create a secondary admin account.
Recovery Execution:
Hour 1: Credentials rotated, site taken offline, hosting security team notified
Hour 2: Full malware scan — 14 infected files identified across theme and uploads directory
Hour 3: Entry point confirmed — CVE in outdated plugin patched and plugin updated
Hour 4–8: Infected files replaced with clean versions, database audited and cleared, rogue admin account removed
Hour 8–12: Full security hardening pass — WAF configured, 2FA enabled, XML-RPC disabled
Hour 12–16: QA pass on all WooCommerce flows — cart, checkout, payment confirmed functional
Hour 18: Site brought back online. Google blacklist check confirmed clean.
Client Communication: The agency PM provided 3 updates to the client throughout the night. At no point did the client know that Technocrackers was involved — all communication came from the agency.
Results: Site recovered in 18 hours. No Google blacklisting occurred. All pending orders processed successfully within 24 hours. The client signed a Premium Care Plan within the week — the hack became the catalyst for a retained service relationship.
When a client site is hacked, speed and structure are everything. Technocrackers provides white label hack response for agencies — available within 2 hours of contact.
Contact Us Now

Stage 4: Post-Recovery — Hours 48 to 72

The Post-Recovery Client Report

Every hack recovery should conclude with a written client report — delivered by the agency in their own name. The report covers: what happened (in non-technical language), what was done to recover the site, what measures are now in place to prevent recurrence, and a recommendation for ongoing maintenance.

The recovery report is the single best conversion tool for a care plan sale. A client who has just experienced a hack is maximally receptive to a maintenance proposal. Lead with the prevention story.

Google Search Console: Requesting Blacklist Removal

If Google issued a ‘Dangerous Site’ warning, submit a reconsideration request via Google Search Console after the site has been fully cleaned. Google typically reviews within 24–72 hours. Document this process in the client report.

Converting the Recovery into a Care Plan

The post-recovery call script: ‘As part of this incident, we have implemented a number of security measures. To ensure these are maintained and that this cannot happen again, we recommend placing your site on our care plan. This covers monthly updates, daily backups, security monitoring, and priority response if anything ever occurs in the future. The cost is [price] per month — which is a fraction of what this incident cost us both in time.’

Is a client site hacked right now? Contact Technocrackers — white label recovery response within 2 hours.

Contact Us Now

Frequently Asked Questions

Q: How long does a WordPress hack recovery take?

A: Simple recoveries — limited file infection, identified entry point, clean backup available — typically take 4–12 hours. Complex recoveries — widespread database compromise, multiple entry points, no recent backup — can take 24–72 hours. Technocrackers provides a written timeline estimate within 2 hours of assessment.

Q: Will my client’s customer data have been stolen?

A: This depends entirely on the nature of the attack. Most opportunistic WordPress hacks are aimed at redirects and spam injection — not data theft. However, if the site stored customer data and the database was accessed, a data breach notification obligation may apply under GDPR or UK GDPR. We flag this risk in our post-recovery report.

Q: Can a restored site get hacked again immediately?

A: Yes — if the entry point is not closed. Restoring from backup without patching the vulnerability that was exploited will result in reinfection, often within hours. Technocrackers always identifies and closes the entry point as part of every recovery, regardless of whether we clean or restore.

Q: Does Technocrackers handle the Google blacklist removal process?

A: Yes. As part of the Premium recovery service, we manage the Google Search Console reconsideration request and monitor the review status until the blacklist warning is removed.

Download the WordPress Hacked Site Response Checklist (Agency Version)

A step-by-step response checklist covering all 4 stages: Containment, Assessment, Recovery, Post-Recovery. Includes client communication scripts and Google blacklist removal guide.

Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Contact us

Let's Unleash Your Digital Potential Together.

Address

C-605, Ganesh glory 11, Nr. BSNL Office, Jagatpur Road, S.G. Highway, Jagatpur, Ahmedabad, India - 382481.

Phone

INDIA : (091) 8200639242 USA : +1 (310) 868-6009

Limited Time Offer

X

Try a Free 2-Hour Test Task

Experience our quality, speed, and communication on any small WordPress task before you commit. No contract. No cost. No obligation.
[For New Agency Partners]

"*" indicates required fields

Name*
0
Would love your thoughts, please comment.x
()
x