Call Anytime 24/7
Mail Us For Support
Office Address
Lahore, Punjab, Pakistan

If you’ve scanned your website in cPanel and it showed infected files, you’re not alone. Malware infections are common on websites, especially those running WordPress, Joomla, or PHP-based apps.
But here’s the important part: clicking Clean in cPanel doesn’t always mean your site is 100% safe. Infected files may be cleaned, quarantined, or left unchanged depending on the virus scanner (ClamAV, ImunifyAV, etc.).
This guide will walk you through a complete step-by-step checklist to ensure your website is fully clean and secure after a virus scan.
Before making any changes, always create a full backup (files + databases).
After running a virus scan in cPanel:
👉 Don’t assume everything is fixed. Some files may still contain hidden malware.
Malware often hides in:
/wp-content/themes//wp-content/plugins//wp-content/uploads/tmp/ or cgi-bin/Look for:
/uploads/ (red flag).cache.php, fonts.php, or class-wp-xyz.php.If you use WordPress:
/wp-content/mu-plugins/.wp-config.php – Look for strange include or base64 code.
.htaccess – Reset to default WordPress rules (hackers often add redirects).
Default WordPress .htaccess:
# BEGIN WordPress
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteRule ^index\.php$ - [L]
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule . /index.php [L]
</IfModule>
# END WordPress
Using phpMyAdmin:
wp_users for unknown admin accounts.wp_options for suspicious scripts, iframes, or base64 code.Go to cPanel → Cron Jobs.
Remove any suspicious jobs calling wget or curl to unknown URLs.
Change all passwords (cPanel, FTP, WordPress admins, DB).
Regenerate WordPress salts from: https://api.wordpress.org/secret-key/1.1/salt/
Add this .htaccess in /wp-content/uploads/:
<FilesMatch "\.(php|phtml|phar)$">
Require all denied
</FilesMatch>
This prevents attackers from running PHP shells in your media folder.
Set proper permissions:
755644wp-config.php: 440Run another cPanel virus scan (ImunifyAV/ClamAV).
Install a security plugin (Wordfence, iThemes Security).
Enable Imunify360 (if available on your hosting).
Keep WordPress, plugins, and themes updated.
Set up daily backups to an external storage (Google Drive, Dropbox, or host’s JetBackup).
Use Cloudflare for free firewall protection.
Clicking Clean in cPanel virus scan doesn’t always mean your site is completely safe. Hackers often leave backdoors that scanners may miss.
By following this step-by-step checklist, you can:
Keep your CMS updated, audit your site regularly, and always maintain backups + security plugins for maximum protection.
Comments are closed