Skip to main content

Monarx Plugin Support

S
Written by Salvador Aguilar
Updated today

Monarx protects your server from malware, automatically and safely

The unique and revolutionary technology we offer identifies malware much more accurately than other products. And with Active Protection enabled as part of your hosting package, we will automatically protect you from all kinds of attacks.

Why is malware on my website a problem?

Malware can cause serious problems for you, your website, and your site's visitors - even if those impacts are not apparent immediately.

Infected websites are often used by cybercriminals to attack 3rd parties:

  • stealing sensitive information like banking passwords or credit card details

  • delivering ransomware or other malware to visitors' devices

  • sending malicious spam emails

  • trying to disrupt other websites with coordinated attacks

  • using your hosting provider's servers to mine cryptocurrency

  • and more...

When this malicious activity is eventually discovered on your website, your website may be blacklisted from search results, blocked from sending even legitimate email, or kicked off your hosting platform. Company firewalls may block users from accessing your site. You may even be liable financially.

Often this malicious activity is not easily visible to you or your site's normal visitors, but the consequences can be severe, nonetheless.

What kinds of malware does it protect against?

Phishing

Phishing sites try to fool unsuspecting visitors into thinking they're some other legitimate and trusted website. They are used to steal passwords, credit cards, and other sensitive information. Attackers may hide a phishing site in your hosting account, but you and your site's legitimate visitors may never see it. Instead, users are generally sent directly to phishing sites by links in malicious emails or from other infected websites. But these sites wreak havoc on the internet, and cybersecurity solutions are constantly on the lookout for them. Once discovered, your entire site may be blacklisted.

Mailer

A mailer sends spam emails in mass campaigns, which will often result in abuse reports and blacklisting of your site's legitimate emails. Mailers can also be used to send stolen sensitive data back to attackers.

Adware

Adware may try to deliver malicious advertisements to your site's visitors, steal money from legitimate advertisers, or manipulate search engines into promoting other sites. Anti-virus programs, search engines, and advertising networks are constantly on the lookout for this bad behavior, and may blacklist your site if discovered.

Web Shell

A web shell is a secret "backdoor" that an attacker uses to access and control your site. It can be used to install and manage all of the other kinds of malware listed here. Web shells are present in the vast majority of attacks, but can be difficult to detect and remove. But if not removed, a site is almost certain to be re-infected soon after any attempted cleaning.

Uploader

An uploader is designed to allow an attacker to put arbitrary files on your site. They are used to install other malware files.

Other

Other kinds of malware may be used to attack your site's visitors or other sites. They may attempt to put ransomware or other malware on your visitors' devices, make coordinated attacks against other websites (e.g., DDoS), use your hosting use your hosting provider's servers to mine cryptocurrency, or more. All of these, once discovered, can result in serious consequences for you and your site.

How does it work?

Our threat mitigation services are continually watching for signs of attempted infection of your website. If Active Protection is enabled in your hosting package, then we'll automatically, immediately, and safely resolve any threats we identify before they cause you or your site's visitors any harm.

Other products use an old and unreliable approach to try to recognize malware - "signatures" that describe what malicious files look like. But today's website malware is increasingly sophisticated and uses techniques to disguise itself such as "obfuscation." As a result, other products both miss lots of malware and incorrectly flag good files as bad. This leaves you to sort out the mess and can even result in breaking your website.

Instead, the unique and revolutionary technology we provide identifies malware based on what it does, not what it looks like. We analyze files and website activity to see through obfuscation and determine the actual behavior of files and the attackers who install and manage them. This results in unparalleled accuracy distinguishing good files from bad. And with our software installed on servers all around the globe, our technology can automatically and safely protect you today based on malicious activity seen somewhere else yesterday.

Can I fix the malware myself?

You can certainly try to address the malware yourself, but keep in mind that often, malware will be injected into otherwise good files that are necessary for the proper functioning of your website. This means, some files you can just delete, while others you'll need to clean carefully.

But more importantly, manually cleaning a malware infection doesn't address the vulnerability that allowed it to infect your site in the first place. Once attackers know that your site is vulnerable, you can expect repeated successful infections. In fact, it's very common for attackers to sell this information to other hackers, increasing your exposure over time. Actually addressing the root vulnerability may require:

  • Changing all of your admin users' passwords

  • Finding and fixing bugs in your own site's code

  • Updating plugins that have found and fixed their own security problems

  • Uninstalling plugins that have not

And all of these may still be unsuccessful, or only successful until the next vulnerability is found and exploited. Trying to keep your site safe from malware this way is difficult and time-consuming.

We strongly encourage you to keep your passwords secure, only install plugins from trusted sources, and to apply security patches often - but we recognize that this is difficult to do perfectly and insufficient on its own. Our threat mitigation services provide extra layers of comprehensive protection against the malware that will still inevitably find a way in, regardless of how it gets there. By focusing on the behavior of malware and automatically and safely removing it, we can keep your site safe much more effectively and easily than you can on your own.

What do malicious and compromised mean?

  • Malicious: refers to files that only contain malware. We mitigate these files by either quarantining them or blocking their execution.

  • Compromised: refers to otherwise legitimate files that have malware injected into them. We mitigate these files by removing the injected malware code.

πŸ“š Related articles for further information:

What does file status mean?

  • Quarantined: refers to malicious files that we have moved to a non-executable location. Your hosting provider configures where quarantined files are stored.

  • Cleaned: refers to compromised files from which our services have removed the injected malware, leaving the original, legitimate file.

πŸ’‘Do not hesitate to contact us if you have further questions.

Did this answer your question?