Our White Glove WordPress Cleanup covers a comprehensive set of remediation actions performed by our dedicated Threat Research Team.
✅ What's included?
Advanced malware removal from files and file system
WordPress core integrity repair using clean core files
Database scanning and malware removal
Malicious user account identification and removal
Malicious plugin and theme identification and removal
Disabling of broken or compromised plugins/themes to preserve site availability
Site security seal upon successful remediation
⛔ Not Included
Plugin or theme updates and upgrades
WordPress core version upgrades
Reinstallation of plugins or themes removed during cleanup
Non-WordPress software or custom application scripts
Configuration of 2FA or CAPTCHA on your behalf
⚠️ WARNING
Running nulled (pirated) plugins or themes on WordPress websites is a huge RISK. Null software is a primary infection vector for websites and can potentially allow reinfection.
We won't remove any nulled software but we urge all customers to replace them with legal versions downloaded directly from the developer website to help them improve their security posture.
Our Cleanup Process
1. 🦠 Malware Removal
All detected threats (Malicious and Injected files) are safely removed and remediated accordingly. As part of this process, our Threat Research Engineers also review files from our low-confidence bucket to make sure all threats are properly addressed.
2. ⁉️ WP Core, Plugin & Themes Review
WordPress core files are verified against official checksums and repaired where necessary.
Malicious plugins and themes are removed.
Broken or compromised (injected) legitimate plugins are disabled rather than deleted wherever possible, so your site remains accessible to end-users while you source clean replacements.
We will notify you of anything that was disabled.
3. 🕵️ Malicious User Removal
Any rogue administrator or user accounts created during the compromise are identified and permanently deleted from your WordPress installation.
⚠️ Depending on the severity of the infection, we reserve the right to force the reset of all Administrators passwords as a cautionary measure to prevent reinfections.
4. 🔍 Database Cleaning
We scan the site database for malware and remove malicious code found.
⚠️ We do not guarantee the removal of SEO SPAM from the database. We run a best effort approach on this regard.
5. 🧑🏻💻 Final Review
We will
6. 📖 Notification & Report
Upon completion, you receive a professional threat assessment report detailing what was found and recommended follow-up actions. A branded Site Security Seal is also issued to share with your visitors.
Timeline
Most cleanups are completed within one business day. Particularly complex or pervasive infections may require multiple rounds of inspection. In rare cases where the site cannot be restored from its current state, a backup restoration may be recommended.
Plugin & Theme Handling — What to Expect
Malware is frequently injected through or embedded within plugins and themes. Our approach balances thorough remediation with keeping the site functional for end-users:
Malicious plugins/themes installed by attackers | will be fully removed from your installation. |
Legitimate plugins/themes found to be infected | will be disabled so they can no longer serve malicious code, but they will not be deleted — giving you time to install a clean version before removal |
We do not update plugins or themes | Applying updates is the responsibility of the site owner/manager after cleanup is complete. |
Do not attempt to clean and reuse infected plugin/theme files yourself | Download a fresh, official copy from the developer and install it cleanly. |
⚠️ Site Availability During Cleanup
We make every reasonable effort to keep the site accessible to end-users throughout the process. However, the removal of infected components may occasionally cause temporary visual or functional issues. We recommend placing the site in maintenance mode if downtime would significantly impact your business.
What to do after a Site Cleanup?
Malware removal is only half the equation. To prevent reinfection and fully secure your site, you must complete the following steps after cleanup. These are not optional — sites that skip post-cleanup hardening are at significantly higher risk of immediate reinfection.
1. Rotate all passwords | Change all WordPress admin passwords, hosting panel credentials, database passwords, FTP/SFTP passwords, and any email accounts associated with the site. Use long, unique passwords for each. |
2. Update all WordPress software | Update WordPress core, all plugins, and all themes to their latest versions immediately. Do not delay — outdated software is the #1 cause of reinfection. |
3. Reinstall disabled/removed plugins & themes | Download fresh, official copies of any plugins or themes that were disabled or removed during cleanup. Do not reuse infected files. |
4. Review all admin user accounts | Go through your WordPress user list and delete any accounts you don't recognize or that are no longer active. Our team will have removed rogue accounts, but review carefully. |
5. Enable Two-Factor Authentication (2FA) | Activate 2FA on all WordPress administrator accounts. This is one of the most effective controls against credential-based attacks. |
6. Implement CAPTCHA on login/registration & forms | Add CAPTCHA protection to your login page, registration forms, and comment forms to block automated brute-force and spam attacks. |
7. Verify and test site functionality | After completing all the above steps, do a thorough walkthrough of your site to confirm everything is functioning as expected before removing any maintenance mode. |
Limitations & Expectations
We will make every reasonable effort to fully remediate your site. However, please be aware of the following limitations:
Malware can be difficult to fully detect in a single pass, especially infections deeply embedded in a database.
If you observe suspicious behavior after cleanup, contact us immediately with as much detail as possible so our team can perform an additional review.
We cannot guarantee against reinfection, if the post-cleanup action items above are not completed promptly.
Sites that remain on outdated software or with weak credentials are at high risk of being reinfected through the same or a different vulnerability.
Our cleanup service covers WordPress installations only.
Custom scripts, other CMS platforms, or server-level compromises fall outside the scope of this service.
