How to protect website and Cpanel from encrypted virus

May 27, 2021

In this article, we explain how to protect Websites and Cpanel from encrypted virus. 



What is an encrypted virus?


Computer Malware is an encrypted virus.it is capable of encrypting the payload to make detection hard. It is using the hide method and antivirus suffer the detection for the scanning time of this malware.
Antimalware integrated with a decryptor can be used to detect the virus.

Protect your Cpanel account:

cPanel is one of the most widely used web servers. All web developers around the world to help them manage websites and hosting accounts.  His reputation has a serious shortcoming-he became the object of a rape. 

Threats make security a key factor. Everyone wants to know that they need to protect their website, but some people don't realize the importance of protecting their hosting space. 

When hackers cannot directly access your site, they are using the encrypted virus in the space on the server where your site files are stored.

 The first way to log in is through your cPanel account. To ensure the security of your website, you should also take steps to protect your cPanel account.

 In this blog, we explain exactly how to protect your cPanel account from hacker attacks, which make it difficult for you to hack your website.

Hacker has also targeted So many Servers because the website and apps are hosts is maintained by non-technical publishers and retailers. they don't know how to secure servers and they are Ignoring websites apps and software updates or dealing with poor-quality software comes at a price. 

If you are facing this kind of problem, you should know these points  how to secure a Cpanel:

Create a secure encrypted password -

we are giving some tips first you want to create an encrypted and totally new password, not any name or like the same digit password and mid of password using numbers, characters using long words like 10 to 20 char and words because if you are creating an encrypted password then 70% of your Cpanel is secure.

Insecure passwords constitute the maximum, not unusual place protection vulnerability. If a hacker compromises an account password, they can use it to deface or infect consumer web websites or use them to unfold viruses.

Update the latest version of Cpanel - 

Most non-technical people don't know about how to update a Cpanel version but they should know to update the latest version of CPanel because if you are not updating a Cpanel version then you a giving the opportunity of the hacker to enter your Cpanel.

go to WHM->SERVER CONFIGURATION->UPDATE PREFERENCE


Cpanel using a virus scanner - 


You want to infiltrate your server but you don't know about it then you hire a malware developer. They will try their best to hide your code, because the longer it takes to find the code, the longer you can find it. 

Take advantage of your server and visitors. If there is no antivirus scanner to track the presence of malicious code in the file, you will not notice it unless your website is blocked or marked as unsafe.

Activate a Firewall - 


cPanel uses Firewall services. To prevent malicious tools or hacker scripts from entering your cPanel account through these services. 

ConfigServer Security and Firewall is the most popular firewall that can be installed in cPanel. Using this firewall service.

It controls the data traffic entering the server room. Incoming and outgoing traffic through many different connections on the hosting server. The firewall closes all connections and allows you to selectively open connections. 

The source from which you want to receive traffic. Avoid DDoS attacks. You don't want hackers to install DDoS tools on your server. The firewall prevents this by closing outbound ports and opening only the ports required to authorize outbound traffic. Monitor network connections. 

A firewall like CFS will check all the network connections it passes through and tell you the suspicious number of failed login attempts. In short, using a firewall can protect your cPanel account from malicious tools that try to access your website through third-party services.

it is mostly used as a firewall for cPanel and is easy to manage through the WHM interface.

Install packages:  https://download.configserver.com/csf.tgz

Extract the zip/tar file

tar zxvf csf.tgz

Change the directory to the CSF installation directory

cd csf

Execute the install script for cPanel

./install.cpanel.sh

Start CSF service

/etc/init.d/csf start

Test the installation configuration

perl /usr/local/csf/bin/csftest.pl

Disable the test flag in CSF configuration after doing the testing 

vi /etc/csf/csf.conf

Restart CSF

/etc/init.d/csf restart

Now, access CSF via WHM > Plugins > ConfigServer Security & Firewall



Activate Brute-Force Protection - 

Setting this restriction prevents retrying to access the server from the IP address. The IP address is stored in your cPanel database. After some time, CPanel may accept another login attempt from that IP address. Navigate to CP Hulk Brute Force Protection in the Security Center. Click Activate. 

Using IP Deny Manager, you can define an IP address, domain name, or multiple addresses to prevent access to websites managed by cPanel. Mandatory: Retry access to the server and test. 

Setting it to strong protection ensures that repeated attempts to access the server from a specific IP address will fail and that the IP address will be blocked.

Activate this feature: "Brute Force Protection>Security Center>Activate" In the "IP Deny Manager" option, you can also prevent cPanel hosting sites from accessing specific IP addresses, specific domain names, or specific IP ranges.

Install SSH -


It is remote access to the server running cPanel. This is a command-line interface, and it may be the best way to correct, update or reconfigure. 

The default port number is 22. SSH or Secure Shell is a remote connection tool in Linux that can help users log in to a remote computer and execute commands.

 Therefore, if you do not protect SSH, you may be attacked. To avoid violations, please redefine this port number so that third parties cannot guess. Choose a difficult set of numbers. Select a port that is not currently in use.

 If necessary, change the system settings. Use version 2 instead of SSH version 1. SSH changes are achieved by editing the SSH daemon configuration file.

 If you move SSH access to another port and your server will not know which port to use for SSH. Many malicious users try to use port 22 to access the server. 

To modify the port on which SSH is running, edit the /etc/ssh/sshd_config file. 

We recommend that you use a port number with a port number less than 1024, and the port number is not used by another service. These ports are privileged; ports because only the root user can bind to them. Port 1024 and higher; unprivileged, ports, anyone can use.

Software Vulnerabilities -

Vulnerabilities in programming can lead to security vulnerabilities. Attackers use these vulnerabilities to root themselves, execute code remotely or inject indirect access to web applications. Usually, if you want to update the product, you can fix the weaknesses, but there may also be zero-day gaps that the designer cannot find and correct. 

Many raids have abused these weaknesses caused by coding errors, including cross-site prefix raids and SQL injection raids.

Chain Attacks -

Bullies like upstream programming engineers and their record workers. If they can negotiate with the staff of the famous WordPress module, then when customers update or introduce the module, a large number of destinations will be contaminated. Take a look at the new raids on the Magecart inventory network. 

These raids are the only cause of the theft of countless Visa numbers. 

Misconfiguration attacks usually succeed because site owners or job managers misconfigure timetables. Your staff can display the MongoDB repository on the open web without confirming the key. Or, on the other hand, the worker is basic passphrase maybe 123456 or the site administrator believes that "password1" will outperform a referral attack. 

Web simplification staff is great, with multiple layers of programming, so it is easy to make mistakes, thus opening the way for attackers and their malware.

Famous Malware Scanning Tools Name -

  1. ImunifyAV
  2.  Imunify360

Both are easily interrogated CPanel and WHM.

Name of Malware Risk from Servers -

  1. Spambots 
  2. SEO spam malware 
  3. DDoS malware 
  4. Cryptojacking 
  5. Malicious
  6. Rootkits  
  7. Credit card