← Back

Hacked Sites in SEO: What They Are and How to Protect Yourself

by Alexey BogomolovUpdated Jan 26, 2026

Hi, I’m Alex. Here you’ll learn why SEO is broken — and how hacked sites used for SEO manipulation are one of the reasons.

Hacked sites in SEO are literally hacked websites where external links get placed without the owner’s knowledge. You’ll also see this under the nickname “pies”.

This is a black hat SEO promotion method.

The vast majority of these sites run on WordPress — the most popular CMS in the world — and it has its fair share of vulnerabilities, which makes it easier for attackers to get into your site.

How does it look in practice?

Hackers — or more accurately, the buyers of a “slice of pie” — choose what kind of link they want placed on the hacked site. Common patterns:

  1. A new content page is created on the site, usually with a text anchor or an image link.

  2. The link is placed on a specific page the buyer cares about.

  3. The link is placed in a sitewide block, most often the footer.

In cases 2 and 3, links are usually made invisible: it can be a 1px element, a transparent image, “near-anchor” text hidden via JavaScript, etc. It all depends on the hackers’ creativity.

How to protect yourself

I’ve already mentioned that most hacks target WordPress sites, so I’ll focus on WP — but the same logic applies to other CMSs too.

  1. Keep WordPress itself updated. A lot of WP updates are specifically about patching known vulnerabilities, so hacked victims are often sites that haven’t updated WP in months/years/etc.

  2. Keep your active plugins updated, and delete the ones you don’t use. Same idea as with the CMS: developers patch bugs and security holes all the time, especially in widely used plugins like Yoast SEO, RankMath, and others.

  3. Use protection against password bruteforce and other attacks: Cloudflare or analogs. The most common WP username is “admin”, so attackers often only need to brute the password. So: don’t use weak passwords. One of the best anti-bruteforce moves is changing your admin login URL (default is /wp-admin/).

My plugin picks for basic WP security

Note: before updating plugins — especially doing batch updates — I strongly recommend making a backup first, or setting up a plugin (hehe) that does automated backups on a schedule.

Why? Not every plugin behaves after an update. Plugins can conflict, devs can deploy a half-baked release, or push an update with a bug, etc.

Example of how hackers try to access my site

Below, I’ll show you how hackers try to access my website (unsuccessfully — cause it runs on Next.js) — all in 24 hours. But you can clearly see the typical PHP endpoints they probe when attacking WordPress sites. In my case, the requests were blocked at the CDN level, so I strongly recommend using a CDN with solid protection like Cloudflare. It has a free plan, it’s easy to set up, and it works for almost any website.

Below you can see a small sample of where these attempts are coming from (or at least where the IPs are registered), along with a bit more info:

endpoints for WP hacking

The most commonly targeted paths by hackers I see are:

  • /xmlrpc.php

  • /admin.php

  • /adminfuns.php

  • /file.php

  • /wp-login.php

But there are many more. I’m listing most of them below just FYI, so you know what to expect:

text PHP slugs
/xmlrpc.php
/admin.php
/adminfuns.php
/file.php
/wp-login.php
/1.php
/aa.php
/abcd.php
/about.php
/akc.php
/akcc.php
/asasx.php
/bolt.php
/buy.php
/classwithtostring.php
/edit.php
/ioxi-o.php
/wp-good.php
/.alf.php
/admin/upload/mini.php
/class.php
/dropdown.php
/flower.php
/gecko-new.php
/info.php
/makeasmtp.php
/mari.php
/moon.php
/postnews.php
/server.php
/term.php
/test1.php
/wp-admin
/wp-admin/css
/wp-admin/images/admin.php
/wp-admin/images/file.php
/wp-admin/index.php
/wp-admin/network/index.php
/wp-admin/postnews.php
/wp-admin/radio.php
/wp-conflg.php
/wp-content/plugins/admin.php
/wp-content/plugins/core-plugin/include.php
/wp-content/plugins/wc-designer-pro/assets/css/wcdp-design.min.css
/wp-content/postnews.php
/wp-content/themes/admin.php
/wp-cron.php
/wp-includes/IXR/test1.php
/wp-includes/txets.php

I’ll update this later once I’ve gathered more up-to-date data.

Also, I looked into the Russian IP that showed up here — it seems to be linked to a known hacking group.

Interesting read about it here: https://thehackernews.com/2025/04/hackers-abuse-russian-bulletproof-host.html

Proton66 russian WP hackers

I'll quote: "Another notable activity concerns the use of compromised WordPress websites related to the Proton66-linked IP address "91.212.166[.]21" to redirect Android device users to phishing pages that mimic Google Play app listings and trick users into downloading malicious APK files."

So be careful — and make sure your website security basics are in place.

How to detect someone else’s links on your site

There are a bunch of ways — depending on what you have in your toolbox. Here are the main ones that come to mind:

  1. Crawl the site with Screaming Frog (or analogs) — look at External Links

  2. Check the site with external crawlers like Ahrefs, Semrush, etc. — again, External / Outgoing links

  3. Manually inspect page source code for alien content and links

  4. Use a bookmarklet that extracts all links from a page (not a silver bullet — it may not detect links that are injected or rendered via JavaScript.)

Why hacked sites are used for SEO

Using hacked sites is still link building — just black-hat link building. And links are still one of Google’s core ranking factors (source 1, source 2).

Don’t forget: hacking websites is a crime and is criminally punishable in most parts of the world.

This is mostly used in highly competitive grey/black niches: adult, CBD, gambling, pharmacy (viagra, steroids, etc.), payday loans, and other markets where the stakes are high. Players in these niches usually don’t care about reputation and often have budgets big enough to buy (or abuse) basically any type of links.