Skip to content
Learn Measure Blog Case studies About

Assess spam damage

Jan 1, 2015 — Updated Mar 4, 2022
Appears in: Safe and secure

This step is for sites hacked to host spam, often with the warning "This site may be hacked" displayed in search results. It's one of the longest steps in the recovery process. In this step, you'll compile a list of the damaged files on your site. You'll use this list in a later step, Clean and maintain your site.

If your site was affected by malware and is flagged with the warning "This site may harm your computer" in search results, see the corresponding article, Assess malware damage (Hacked with malware).

Because certain hacking campaigns affect hundreds and thousands of sites in similar ways, they can be cleaned up using a set of specific steps. If any of these hacking campaigns describe the hack on your site, click through to read the guide.

  • Fixing the Japanese Keyword Hack
  • Fixing the Gibberish Hack
  • Fixing the Cloaked Keywords and Links Hack
Security
Last updated: Mar 4, 2022 — Improve article
Return to all articles
Share
subscribe

Contribute

  • File a bug
  • View source

Related content

  • developer.chrome.com
  • Chrome updates
  • Web Fundamentals
  • Case studies
  • Podcasts
  • Shows

Connect

  • Twitter
  • YouTube
  • Google Developers
  • Chrome
  • Firebase
  • Google Cloud Platform
  • All products
  • Terms & Privacy
  • Community Guidelines

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies.