Blog | G5 Cyber Security

Large HTML Posts: Spam or Security Threat?

TL;DR

Attackers are posting very large HTML pages on your website. This could be simple spam, but it’s more likely a malicious attempt to harm your site’s performance, SEO, or exploit vulnerabilities. Check for hidden code, redirects, and unusual server load. Scan with security tools and consider limiting post size.

1. Understand the Problem

Large HTML posts are suspicious because legitimate content rarely requires huge filesizes. Here’s why attackers use them:

2. Identify the Posts

Find the posts causing problems. Most content management systems (CMS) have tools for this.

If you have a lot of posts, consider using a database query (if you’re comfortable with SQL) to find them:

SELECT title, post_content FROM wp_posts WHERE post_type = 'post' ORDER BY LENGTH(post_content) DESC LIMIT 10;

3. Inspect the HTML Source Code

This is the most important step! Don’t just look at what you see on the page – view the raw HTML source code.

4. Check Server Logs

Server logs can reveal more about the attack.

The location of your server logs depends on your hosting provider and web server (e.g., Apache, Nginx).

5. Scan with Security Tools

Use security plugins or online scanners to check for malware and vulnerabilities.

6. Limit Post Size

Prevent future attacks by limiting the maximum size of posts.

A reasonable post size limit is usually around 5-10MB, depending on your website’s needs.

7. Restore from Backup (If Necessary)

If you find evidence of a serious compromise, restore your website from a clean backup taken before the attack occurred. Make sure to update all software and plugins *before* restoring.

8. Improve cyber security generally

Exit mobile version