Exploiting a vulnerability to deface or change the content of one or more webpages.
This involves attackers altering one or more web pages, usually by exploiting security vulnerabilities or gaining unauthorised access to the site's admin interface. The attackers may alter the content and design of the affected pages. Such attacks may be politically motivated, carried out by hacktivists attempting to make a political statement. It is important to fix the vulnerability that allowed the attackers to gain access.
- It is important to fix the vulnerability that allowed the attackers to gain access.
- If you suspect that access was gained via the administration pages, change the password.
- Check whether the attackers may have accessed other systems.
- It is crucial that a website is properly protected. This involves installing all updates for the server software and any content management systems (CMS) in use.
- Use a unique, strong password for site administration and, if possible, enable two-factor authentication (2FA).
Your report via the online form helps the NCSC identify trends. This makes it possible for the NCSC to raise public awareness in a targeted way.
Attacks on content management systems (CMS) can be greatly reduced by installing important security updates as soon as they are available. There are also several other measures that can help to secure CMS:
Last modification 09.10.2025