Have a Question?

What is URL Injection?

You are here:
< All Topics

URL injections occur when attackers create new pages on existing websites without the permission or knowledge of the legitimate site owner. These new pages are injected with codes that redirect users to illicit sites or facilitate an attack on other sites being targeted by the attackers. Generally, the injections are conducted through software vulnerabilities, plug-ins or unsecured directories. To prevent this form of attack, quick identification of the new pages as they go live is necessary. After the injected code is detected, site administrators must quickly remove the functions used by hackers to create the new pages and restore infected directories with versions saved on restore points. URL injections target sites with security vulnerabilities, so the best way to prevent future occurrences is to address existing security gaps.  You may choose to do this for yourself if you have the resources and knowhow, or it may be more appropriate to engage a penetration tester who can work with you to objectively identify where your weaknesses are.  Alongside having solid web application firewalls in place, there are some ways in which site owners can identify potentially injected pages, one being through Google search console which does flag this, enabling you to search your site directory for new pages you did not authorise.  

If you need support in protecting your business website from this form of cyber attack get in touch with us today.

Was this article helpful?
3.5 out of 5 stars
5 Stars 0%
4 Stars 67%
3 Stars 0%
2 Stars 0%
1 Stars 33%
How can we improve this article?
Please submit the reason for your vote so that we can improve the article.