Step 4: Touch base with Webmaster Tools

Verify ownership of your site in Google Webmaster Tools to read the critical messages (if any) from Google that will help you determine the next step in the recovery process.

If you've already verified ownership of your site, you can skip the first action below and go right to checking your site information in Webmaster Tools.

You'll need:

  • The ability to verify ownership of your site using a technique such as adding a file in the root directory, authoring of meta tags, owning a Google Analytics administrative account for the site, etc.

Verify ownership of your site in Webmaster Tools

  1. Open a browser and navigate to Webmaster Central at
  2. Click Webmaster Tools.
  3. Sign in to Webmaster Tools using a Google account. If you don't have a Google account, click Create an account. A new Google account doesn't mean you'll lose your existing email account with another company. (More information about accounts.)
  4. Click Add a site. Type your site's URL in the box, then click Continue.
  5. Decide the most convenient verification method for you. The Recommended method tab on the verification page shows the method Google thinks will work best. Additional methods are listed on the Alternate methods tab. (More information about verification.)
  6. Bring your site back online if you selected a verification method that requires access to your site, such as HTML meta tag or HTML file.
  7. Click Verify to verify ownership using your selected method. If verification is successful, you'll see a congratulatory screen mentioning that you're a verified owner. You can take your site back offline, but be aware that it will need to be back online in future steps.

Once verified, check that the hacker didn't already verify ownership in Webmaster Tools and make unwanted settings changes.

  1. Navigate to the main Webmaster Tools homepage by clicking the Webmaster Tools logo.
  2. Find your site, then click Manage site.
  3. Click Add or remove users.
  4. Be sure that all users and owners listed are authorized.
  5. Document the email address of any unauthorized user (in case it's helpful in the future), then delete the user from your site. For unauthorized owners, you'll need to both delete the owner and any possible verification tokens, such as a verification metatag on your homepage or a HTML file on your server. (More information.)
  6. Investigate for unwanted settings changes in Webmaster Tools. Click the Gear icon , then click Site Settings to check for possible undesirable changes by the hacker such as a lower Crawl rate (perhaps with the goal to avoid search engine spiders). Also, check that nothing unusual is listed in the section Google Index > Remove URLs or Gear icon  > Change of Address.

Determine the nature of the attack

The information in the Message Center and Security Issues in Webmaster Tools can help you determine whether your site was compromised in any of the following ways:

  • With spammy content that could reduce the quality and relevance of search results.
  • For phishing purposes.
  • To distribute malware.

To investigate hacking or malware using Webmaster Tools, complete the following steps:

  1. Navigate to the Webmaster Tools homepage by clicking the Webmaster Tools logo in the upper corner.
  2. Click Messages.
  3. Check if there is are any critical messages from Google regarding whether your site was used for 1) serving spammy pages, text or links, 2) phishing, 3) distributing malware. If you have a phishing notification, please do not delete this message until you have completed the entire recovery process.
  4. Navigate to Security Issues in Webmaster tools.
    • Sites affected with malware will show a top-level heading of “Malware,” and then categories of malware types, such as “Modified server configuration” or “Error template injection.” In these cases, the hacker may be using your site to infect your visitors with software designed to access confidential information or harm their computers. To find out how to fix this, please continue to Step 5: Assess the damage (malware).
    • Sites that were hacked to serve spam may display a top-level heading of “Hacked” and then categories hack types, such as “Content injection.” It’s likely the hacker has placed spammy pages, text, or links on your site. To find out how to fix this, please continue to  Step 5: Assess the damage (spam).
    • Sites with a "phishing notification” in Webmaster Tools Message Center may not show any information within Security Issues. By creating phishing pages on your site, the hacker is using your site to obtain users' login, password, or financial details, often by masquerading as a trustworthy site. Since the cleanup for phishing is similar to spam, please continue to Step 5: Assess the damage (spam).

What's next:

Step 4: Touch base with Webmaster Tools is now completed. The next step in the process is either Step 5: Assess the damage (spam) or Step 5: Assess the damage (malware).

Step Technical expertise required
1. Watch the overview Beginner
2. Contact your hoster and build a support team Beginner
3. Quarantine your site Intermediate
4. Touch base with Webmaster Tools Intermediate
5. Assess the damage (spam) or
    Assess the damage (malware)
6. Identify the vulnerability Advanced
7. Clean and maintain your site Advanced
8. Request a review Intermediate


How helpful is this article:

Feedback recorded. Thanks!
  • Not at all helpful
  • Not very helpful
  • Somewhat helpful
  • Very helpful
  • Extremely helpful