We are currently still building up the English documentation; not all sections have been translated yet. Please note that there may still be German screenshots or links to German pages even on pages that have already been translated. This guide mostly addresses English speaking users in Germany.
Protecting JTL-Shop from malware
Your task/initial situation
Avoidance of malware
In the following, we would like to give you some general tips on how to minimise the risk of your JTL-Shop being infected by malware. Please note that there can never be absolute protection. With the following measures, however, you can already reduce the risk significantly.
What to do in case of malware infestation?
If your JTL-Shop should ever be infected with malware, you must act quickly. The best thing to do at this moment is to contact a professional who knows how to combat malware. Also contact the web host who operates the server on which your JTL-Shop is running. This person can usually help with the removal of malware. The following steps should therefore also be understood more as a guideline. You may need to take further measures to remove the malware completely.
You will usually learn about malware in your JTL-Shop via a message in the web browser that appears when you call up the address of your online shop.
- From a computer that you know is secure (e.g. a previously unused device), change all passwords that provide access to the admin back end of JTL-Shop and the FTP server. This is the only way to prevent the malware from being directly reinstalled by the attacker. For the new passwords, choose combinations of letters, numbers, and special characters that are as difficult as possible and cannot be guessed.
- First, do not access the FTP server again, but update the anti-virus software on all computers that had access to the FTP server. Then have all the computers scanned completely to find out if there is malware on any of them. Remove the malware and, if necessary, take countermeasures to prevent reinfection.
- Have the file structure checked (see Checking the file structure). Scan all modified files for malicious code. If you find files with malicious code, make a note of the modification time. Since verification only examines part of the files, you should then search for all files that were changed around the same time or afterwards. Your web host may be able to help you with this. Replace all changed files with the original JTL-Shop files. Alternatively, you can restore a backup of the JTL-Shop files from before the malware infestation.
- Once the malicious code has been cleaned, follow the message in the browser to have another scan performed so that the shop is removed from malware blacklists again.