Progress of work
After receiving a request from a client about the hack of the Memory website, our team immediately began a comprehensive analysis to identify the source and scale of the incident. The first step was to conduct a deep diagnostic of the entire system, covering the inspection of the file structure, databases, server logs and configuration files. We looked for types of web application vulnerabilities that could be exploited by attackers, as well as the presence of malicious code or hidden backdoors.
The analysis showed that the site was broken due to discovered security weaknesses that allowed attackers to access the file system. This emphasized the need not only to eliminate the current consequences, but also to create a reliable mechanism to protect the site from hacking in the future.
Based on the data obtained, we developed and implemented a multi-layered security system, including both proactive and reactive measures.
1. Developing a plugin for monitoring file integrity: We have created a specialized plugin, which is our own solution for protecting WordPress from hacking. This plugin constantly monitors the integrity of site files. Its main functionality is as follows:
- Integrity check: The plugin regularly scans all site files, comparing their current hash sums with reference “healthy” copies saved in a safe place. This allows you to identify any unauthorized changes.
- Automatic comparison and recovery: When any changes in files are detected, the plugin automatically compares the modified files with their “healthy” versions. If a discrepancy is detected, the plugin automatically overwrites damaged or modified files with the original, unmodified versions. This ensures quick recovery after an attack, minimizing site downtime.
- Notification system: For a prompt response to potential threats, the plugin is integrated with a Telegram bot. In case of detection of any changes or suspicious activity, the site administrator receives an immediate notification in Telegram, which allows you to quickly assess the situation and take additional measures if necessary. This mechanism is the most important element of WordPress site security.

2. Strengthening the security of the administrative panel: One of the most common types of web application vulnerabilities is unauthorized access to the administrative panel. To avoid this, we have introduced strict security measures:
- IP address access restriction: We set up a security plugin that allows access to the site’s admin panel only from a predefined list of allowed IP addresses. Any attempt to log in from an unauthorized IP address is automatically blocked. This makes it much more difficult to hack the site using brute force or other attacks.
- Blocking after an unsuccessful attempt: After the first unsuccessful attempt to enter a password, the user and their IP address are automatically blocked. This effectively counteracts password guessing and makes unauthorized access attempts virtually impossible.
- Changing the URL of the admin panel: The default address for entering the admin panel (/wp-admin or /wp-login.php) is a known point of attack. We changed it to a unique, complex link consisting of a chaotic set of characters. This means that attackers will first have to guess the correct URL for entry before they can even try to guess the password. This is a powerful barrier to protecting WordPress from hacking.

Input data
The result obtained