{"id":4333,"date":"2016-04-25T03:38:02","date_gmt":"2016-04-25T07:38:02","guid":{"rendered":"http:\/\/www.mccordweb.com\/weblogs\/?p=4333"},"modified":"2016-04-22T17:00:37","modified_gmt":"2016-04-22T21:00:37","slug":"hackers-want-wordpress-blog","status":"publish","type":"post","link":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/","title":{"rendered":"What Do Hackers Want with Your WordPress Blog?"},"content":{"rendered":"<figure id=\"attachment_4334\" aria-describedby=\"caption-attachment-4334\" style=\"width: 300px\" class=\"wp-caption alignright\"><a href=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-4334\" src=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s-300x300.jpg\" alt=\"Expect the unexpected.\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s-300x300.jpg 300w, https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s-200x200.jpg 200w, https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s.jpg 707w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-4334\" class=\"wp-caption-text\">Illustration depicting a roadsign with an &#8216;expect the unexpected&#8217; concept. Sky background.<\/figcaption><\/figure>\n<p>The question is always the same, &#8220;Why does a hacker want to get into <em>my<\/em> blog?&#8221; The answer is always the same &#8211; to drive traffic. But, that traffic is not to your site, but rather to drive traffic to a site they are being paid to promote.<\/p>\n<p>The traffic is either direct or indirect. Direct traffic is where a hacker breaks into your WordPress site and then overwrites your website with their own site or landing pages pointing to their own site, I just saw one today for a webmaster prospect that was taken over by pornography sellers.<\/p>\n<p>Indirect traffic is more sneaky. Here the hackers break in to WordPress and hope that you won&#8217;t know. Then they leave self-replicating scripts in various locations of WordPress and even tunnel into your own website. They use these scripts to create &#8220;ghost&#8221; pages that only search engines can see that are filled with links and keywords all pointing to sites they are hoping to boost in the organic search results.<\/p>\n<p>In many cases if you find what you think is the spam directory (usually they hide it) and you delete it, the replicating scripts simply recreate everything you&#8217;ve deleted. You&#8217;ve got to do a very thorough\u00a0 wipe of the server and site files to get rid of this type of hack permanently.<\/p>\n<p>Many business owners ask, &#8220;Why me? I&#8217;m not Amazon and don&#8217;t even have tons of traffic!&#8221; Here&#8217;s where the hackers are playing a numbers game. The more sites that point to the site they are promoting, the better off they are initially.<\/p>\n<p>Typically sites that these hackers are promoting are trying to garner organic placement temporarily to serve malware installations. Once the search engines figure out which sites they are they shut them down, but by then many people are now infected and the hackers then go on to the next site.<\/p>\n<p>The best way to protect yourself from these kinds of issues is to keep WordPress updated and as secure as possible with plugins that monitor files and then check your WordPress application at least once a week.<\/p>\n<p>If you need help with monitoring WordPress, please check out our <a href=\"http:\/\/www.mccordweb.com\/webmaster\/index.php\">webmaster services<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The question is always the same, &#8220;Why does a hacker want to get into my blog?&#8221; The answer is always the same &#8211; to drive traffic. But, that traffic is not to your site, but rather to drive traffic to a site they are being paid to promote. The traffic is either direct or indirect. Direct traffic is where a hacker breaks into your WordPress site and then overwrites your website with their own site or landing pages pointing to their own site, I just saw one today for a webmaster prospect that was taken over by pornography sellers. Indirect traffic is more sneaky. Here the hackers break in to WordPress and hope that you won&#8217;t know. Then they leave self-replicating scripts in various locations of WordPress and even tunnel into your own website. They use these scripts to create &#8220;ghost&#8221; pages that only search engines can see that are filled with links and keywords all pointing to sites they are hoping to boost in the organic search results. In many cases if you find what you think is the spam directory (usually they hide it) and you delete it, the replicating scripts simply recreate everything you&#8217;ve deleted. You&#8217;ve got to do a very thorough\u00a0 wipe of the server and site files to get rid of this type of hack permanently. Many business owners ask, &#8220;Why me? I&#8217;m not Amazon and don&#8217;t even have tons of traffic!&#8221; Here&#8217;s where the hackers are playing a numbers game. The more sites that point to the site they are promoting, the better off they are initially. Typically sites that these hackers are promoting are trying to garner organic placement temporarily to serve malware installations. Once the search engines figure out which sites they are they shut them down, but by then many people are now infected and the hackers then go on to the next site. The best way to protect yourself from these kinds of issues is to keep WordPress updated and as secure as possible with plugins that monitor files and then check your WordPress application at least once a week. If you need help with monitoring WordPress, please check out our webmaster services.<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[172,29],"tags":[177,481,480],"class_list":["post-4333","post","type-post","status-publish","format-standard","hentry","category-blogging","category-bright-idea-tips","tag-blogs","tag-hackers","tag-spammers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Do Hackers Want with Your WordPress Blog? | The Web Authority<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Do Hackers Want with Your WordPress Blog? | The Web Authority\" \/>\n<meta property=\"og:description\" content=\"The question is always the same, &#8220;Why does a hacker want to get into my blog?&#8221; The answer is always the same &#8211; to drive traffic. But, that traffic is not to your site, but rather to drive traffic to a site they are being paid to promote. The traffic is either direct or indirect. Direct traffic is where a hacker breaks into your WordPress site and then overwrites your website with their own site or landing pages pointing to their own site, I just saw one today for a webmaster prospect that was taken over by pornography sellers. Indirect traffic is more sneaky. Here the hackers break in to WordPress and hope that you won&#8217;t know. Then they leave self-replicating scripts in various locations of WordPress and even tunnel into your own website. They use these scripts to create &#8220;ghost&#8221; pages that only search engines can see that are filled with links and keywords all pointing to sites they are hoping to boost in the organic search results. In many cases if you find what you think is the spam directory (usually they hide it) and you delete it, the replicating scripts simply recreate everything you&#8217;ve deleted. You&#8217;ve got to do a very thorough\u00a0 wipe of the server and site files to get rid of this type of hack permanently. Many business owners ask, &#8220;Why me? I&#8217;m not Amazon and don&#8217;t even have tons of traffic!&#8221; Here&#8217;s where the hackers are playing a numbers game. The more sites that point to the site they are promoting, the better off they are initially. Typically sites that these hackers are promoting are trying to garner organic placement temporarily to serve malware installations. Once the search engines figure out which sites they are they shut them down, but by then many people are now infected and the hackers then go on to the next site. The best way to protect yourself from these kinds of issues is to keep WordPress updated and as secure as possible with plugins that monitor files and then check your WordPress application at least once a week. If you need help with monitoring WordPress, please check out our webmaster services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/\" \/>\n<meta property=\"og:site_name\" content=\"The Web Authority\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mccordweb\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-25T07:38:02+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s-300x300.jpg\" \/>\n<meta name=\"author\" content=\"Nancy McCord\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:site\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy McCord\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/\"},\"author\":{\"name\":\"Nancy McCord\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\"},\"headline\":\"What Do Hackers Want with Your WordPress Blog?\",\"datePublished\":\"2016-04-25T07:38:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/\"},\"wordCount\":390,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/Depositphotos_13251382_s-300x300.jpg\",\"keywords\":[\"Blogs\",\"Hackers\",\"Spammers\"],\"articleSection\":[\"Blogs\",\"Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/\",\"name\":\"What Do Hackers Want with Your WordPress Blog? | The Web Authority\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/Depositphotos_13251382_s-300x300.jpg\",\"datePublished\":\"2016-04-25T07:38:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/Depositphotos_13251382_s-300x300.jpg\",\"contentUrl\":\"http:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2016\\\/04\\\/Depositphotos_13251382_s-300x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2016\\\/04\\\/25\\\/hackers-want-wordpress-blog\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Do Hackers Want with Your WordPress Blog?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"name\":\"The Web Authority | McCord Web Services News\\\/Blog\",\"description\":\"Smart Digital Marketing, Real Business Results - McCord Web Services\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\",\"name\":\"McCord Web Services LLC\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"width\":450,\"height\":203,\"caption\":\"McCord Web Services LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mccordweb\",\"https:\\\/\\\/x.com\\\/mccordweb\",\"https:\\\/\\\/www.instagram.com\\\/nancy_mccord\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nancymccord\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/mccordweb\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\",\"name\":\"Nancy McCord\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"caption\":\"Nancy McCord\"},\"sameAs\":[\"http:\\\/\\\/www.mccordweb.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Do Hackers Want with Your WordPress Blog? | The Web Authority","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/","og_locale":"en_US","og_type":"article","og_title":"What Do Hackers Want with Your WordPress Blog? | The Web Authority","og_description":"The question is always the same, &#8220;Why does a hacker want to get into my blog?&#8221; The answer is always the same &#8211; to drive traffic. But, that traffic is not to your site, but rather to drive traffic to a site they are being paid to promote. The traffic is either direct or indirect. Direct traffic is where a hacker breaks into your WordPress site and then overwrites your website with their own site or landing pages pointing to their own site, I just saw one today for a webmaster prospect that was taken over by pornography sellers. Indirect traffic is more sneaky. Here the hackers break in to WordPress and hope that you won&#8217;t know. Then they leave self-replicating scripts in various locations of WordPress and even tunnel into your own website. They use these scripts to create &#8220;ghost&#8221; pages that only search engines can see that are filled with links and keywords all pointing to sites they are hoping to boost in the organic search results. In many cases if you find what you think is the spam directory (usually they hide it) and you delete it, the replicating scripts simply recreate everything you&#8217;ve deleted. You&#8217;ve got to do a very thorough\u00a0 wipe of the server and site files to get rid of this type of hack permanently. Many business owners ask, &#8220;Why me? I&#8217;m not Amazon and don&#8217;t even have tons of traffic!&#8221; Here&#8217;s where the hackers are playing a numbers game. The more sites that point to the site they are promoting, the better off they are initially. Typically sites that these hackers are promoting are trying to garner organic placement temporarily to serve malware installations. Once the search engines figure out which sites they are they shut them down, but by then many people are now infected and the hackers then go on to the next site. The best way to protect yourself from these kinds of issues is to keep WordPress updated and as secure as possible with plugins that monitor files and then check your WordPress application at least once a week. If you need help with monitoring WordPress, please check out our webmaster services.","og_url":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/","og_site_name":"The Web Authority","article_publisher":"https:\/\/www.facebook.com\/mccordweb","article_published_time":"2016-04-25T07:38:02+00:00","og_image":[{"url":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s-300x300.jpg","type":"","width":"","height":""}],"author":"Nancy McCord","twitter_card":"summary_large_image","twitter_creator":"@mccordweb","twitter_site":"@mccordweb","twitter_misc":{"Written by":"Nancy McCord","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/#article","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/"},"author":{"name":"Nancy McCord","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba"},"headline":"What Do Hackers Want with Your WordPress Blog?","datePublished":"2016-04-25T07:38:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/"},"wordCount":390,"commentCount":0,"publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s-300x300.jpg","keywords":["Blogs","Hackers","Spammers"],"articleSection":["Blogs","Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/","url":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/","name":"What Do Hackers Want with Your WordPress Blog? | The Web Authority","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/#primaryimage"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s-300x300.jpg","datePublished":"2016-04-25T07:38:02+00:00","breadcrumb":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/#primaryimage","url":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s-300x300.jpg","contentUrl":"http:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2016\/04\/Depositphotos_13251382_s-300x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mccordweb.com\/weblogs\/2016\/04\/25\/hackers-want-wordpress-blog\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mccordweb.com\/weblogs\/"},{"@type":"ListItem","position":2,"name":"What Do Hackers Want with Your WordPress Blog?"}]},{"@type":"WebSite","@id":"https:\/\/www.mccordweb.com\/weblogs\/#website","url":"https:\/\/www.mccordweb.com\/weblogs\/","name":"The Web Authority | McCord Web Services News\/Blog","description":"Smart Digital Marketing, Real Business Results - McCord Web Services","publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mccordweb.com\/weblogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization","name":"McCord Web Services LLC","url":"https:\/\/www.mccordweb.com\/weblogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","contentUrl":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","width":450,"height":203,"caption":"McCord Web Services LLC"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mccordweb","https:\/\/x.com\/mccordweb","https:\/\/www.instagram.com\/nancy_mccord\/","https:\/\/www.linkedin.com\/in\/nancymccord","https:\/\/www.youtube.com\/user\/mccordweb"]},{"@type":"Person","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba","name":"Nancy McCord","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","caption":"Nancy McCord"},"sameAs":["http:\/\/www.mccordweb.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/comments?post=4333"}],"version-history":[{"count":1,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4333\/revisions"}],"predecessor-version":[{"id":4335,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/4333\/revisions\/4335"}],"wp:attachment":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/media?parent=4333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/categories?post=4333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/tags?post=4333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}