Between May 2022 and December 2024, cybersecurity researchers identified a staggering 692,865 fake e-commerce sites linked specifically to Japanese Keyword Hack campaigns. If you are reading this, you are likely part of a statistic that no site owner wants to join.
The Japanese Keyword Hack (also known as the “Japanese SEO Spam” hack) is not just a nuisance; it is a silent killer of online businesses. The attack works by injecting spammy Japanese characters into your site’s search results, often promoting counterfeit brand-name merchandise. The consequences are swift and brutal. Most victims experience a 40-80% loss in organic traffic within the first month of infection.
The most terrifying aspect is the speed at which it spreads. Hackers can generate over 100,000 indexed pages of spam on your domain overnight. They use “cloaking” techniques to show normal content to you, while showing spam to Google bots, meaning you might not even know you are infected until your rankings collapse.
The good news? This is 100% preventable with proper security measures, and recovery is possible. While full recovery of SEO rankings typically takes 2-6 weeks after Google re-reviews your site, the first step is taking back control.
If you want your site cleaned, your rankings restored, and full control regained, you must act immediately. Here is the comprehensive, 20-step guide to removing the Japanese Keyword Hack from your WordPress site.
01) Immediately Back Up Your Website
Before you touch a single file, you must create a backup. Cleaning a hacked site involves modifying core files and databases. One wrong move could delete your legitimate content permanently.
Why This Matters: If the cleanup process breaks your site, this backup is your only lifeline to restore the previous version (even if it is infected) so you can try again. Use your hosting provider’s cPanel or a plugin like UpdraftPlus to download a full copy of your database and wp-content folder.
02) Search Your Site for Japanese Hacks Using Google Search
You need to understand the scale of the infection. Go to Google and type site:yourdomain.com into the search bar. Scroll through the results.
Why This Matters: You are looking for pages with Japanese characters in the title or description that you didn’t create. This confirms the infection and gives you an idea of how many spam pages Google has indexed. Take screenshots for your records.
03) Check Your Google Search Console for Security Issues & Unusual Access
Hackers often add themselves as “owners” of your site in Google Search Console (GSC) to control your sitemaps and manipulate search results. Log in to GSC and check the “Security & Manual Actions” tab.
Why This Matters: If you see a manual action penalty, you know Google has already flagged your site. More importantly, check “Settings” > “Users and permissions.” If you see any email addresses you don’t recognize, revoke their access immediately.
4) Use the URL Inspection Tool to Identify Cloaking & Hidden Content
Hackers use “cloaking” to hide their spam from human visitors while showing it to search engines. Use the URL Inspection tool in GSC on one of the suspicious URLs you found in step 2. Click “Test Live URL” and then “View Tested Page.”
Why This Matters: This allows you to see the page exactly as Googlebot sees it. You will likely see the Japanese spam content here, even if the page looks normal when you visit it in your browser. This confirms the hack is server-side.
05) Remove Unauthorized & Suspicious WordPress Admin Accounts
Log in to your WordPress dashboard and navigate to Users > All Users. Look for any administrator accounts that you did not create. Hackers often create “ghost” admin accounts to maintain backdoor access.
Why This Matters: Deleting the malware files is useless if the hacker still has a key to the front door. Delete any suspicious accounts immediately and attribute their content to a safe user (or delete it entirely).
06) Audit Recently Modified Files Using FTP/SSH & File Timestamps
Connect to your server using an FTP client (like FileZilla) or SSH. Sort your files by “Last Modified” date. Look for core WordPress files (like index.php, header.php, or footer.php) that were modified around the time the hack started.
Why This Matters: Core WordPress files should rarely be modified. If index.php was changed three days ago and you didn’t do it, that file likely contains the malicious code injecting the spam.
07) Clean Your WordPress Database of Malicious Entries
Hackers often inject code directly into your database tables, specifically wp_posts and wp_options. Use phpMyAdmin via your hosting control panel to search for common spam terms or script tags.
Why This Matters: The Japanese Keyword Hack is notorious for using the database to auto-generate pages. Even if you clean the files, a dirty database can regenerate the spam immediately. Look for suspicious code in the active_plugins option or unfamiliar tables.
08) Check & Clean Your .htaccess File for Redirects & Rewrites
The .htaccess file controls how your server handles traffic. Hackers modify this file to redirect visitors coming from Google to their spam sites while letting you (the admin) see the normal site.
Why This Matters: This is a primary method for cloaking. Open your .htaccess file and look for suspicious rewrite rules involving user agents like “Googlebot.” If you are unsure, you can usually regenerate a clean .htaccess file by going to Settings > Permalinks in WordPress and clicking “Save Changes.”
09) Run a Professional Malware Scanner
While manual checks are vital, sophisticated malware hides deep in the system. Use a server-side scanner or a high-quality security plugin like Wordfence, MalCare, or Sucuri.
Why This Matters: These scanners check your files against a vast repository of known malware signatures. They can identify backdoors and “obfuscated” code (code that looks like gibberish to hide its function) that you might miss with the naked eye.

10) Identify & Delete Auto-Generated Spam Pages & Posts
Once the backdoor is closed, you need to remove the content. Go to your Posts and Pages sections. You may find thousands of spam posts.
Why This Matters: These pages are what Google is indexing. You need to bulk delete them. If there are too many to delete manually via the dashboard, you may need to run a SQL command in phpMyAdmin to delete posts containing specific spam keywords.
11) Update All WordPress Plugins to Latest Versions
Vulnerabilities in outdated plugins are the number one entry point for hackers. Navigate to your Plugins page and update everything.
Why This Matters: Software developers release updates specifically to patch security holes. Running an old version of a contact form or slider plugin is like leaving your window unlocked. If a plugin hasn’t been updated by its developer in years, replace it with a supported alternative.
12) Update WordPress Core to the Latest Version
Ensure your WordPress installation is running the most current version.
Why This Matters: Like plugins, WordPress core updates often contain critical security patches. Hackers use automated bots to scan the web for sites running older versions of WordPress because they know exactly how to break into them.
13) Update All WordPress Themes to Latest Versions
Check your active theme and any inactive themes for updates.
Why This Matters: Themes, especially those bundled with third-party scripts, can be a vector for infection. Even if a theme is inactive, its files are still on your server and can be exploited. Delete any themes you are not using.
14) Disable File Editing & Add Security Constants to wp-config.php
You can harden your site by adding a specific line of code to your wp-config.php file: define( ‘DISALLOW_FILE_EDIT’, true );.
Why This Matters: This disables the built-in file editor in the WordPress dashboard. If a hacker manages to get into your admin panel, this prevents them from easily editing your plugin or theme files to execute code.
15) Scan Google Search Console for Indexed Spam URLs & Create Removal List
Go back to GSC. You will likely see a massive spike in “Indexed” pages. Use the URL Removal Tool to temporarily hide these spam URLs from search results.
Why This Matters: You want to speed up the process of fixing your search results. While Google will eventually drop 404 (deleted) pages, explicitly telling Google to remove directories (like /shop/ or /brand/ if created by hackers) helps clean up your reputation faster.
16) Submit Your Site for Manual Review & Reconsideration Request
If you found a manual action in Step 3, you must submit a reconsideration request. Explain clearly what happened, the steps you took to clean it, and the security measures you have implemented.
Why This Matters: A manual penalty will not go away on its own. A human at Google needs to review your site and confirm it is clean before they lift the penalty.
17) Implement a Web Application Firewall (WAF) to Block Future Attacks
Set up a WAF like Cloudflare, Sucuri, or Wordfence Premium.
Why This Matters: A WAF sits between your website and the internet. It filters traffic and blocks malicious requests before they even reach your server. This is one of the most effective ways to prevent reinfection.
18) Strengthen WordPress Login Security
Implement Two-Factor Authentication (2FA) for all admin users. You should also limit login attempts to prevent “brute force” attacks where bots guess passwords.
Why This Matters: Passwords can be stolen or guessed. 2FA requires a second form of verification (like a code on your phone), making it nearly impossible for a hacker to log in even if they have your password.
19) Set Up WordPress Security Monitoring & Activity Logging
Install a plugin that logs user activity, such as WP Activity Log.
Why This Matters: You need to know what is happening on your site. If a file is modified or a user logs in from an unusual country, you should be alerted immediately. Early detection is key to minimizing damage.
20) Maintain Ongoing Security: Regular Updates, Backups & Security Audits
Security is not a one-time event; it is a habit. Schedule regular audits, ensure automated backups are running off-site, and keep everything updated.
Why This Matters: The threat landscape changes daily. What is secure today might be vulnerable tomorrow. Regular maintenance ensures you stay ahead of the hackers.
Quick Removal Checklist
Immediate (First 24 Hours):
- Take a full backup of the site (files and database).
- Check GSC for manual actions and unauthorized owners.
- Scan the site with a professional malware scanner.
- Change all administrator passwords.
- Update all plugins, themes, and WordPress core.
- Put the site into maintenance mode.
Short-Term (Days 2-7):
- Clean database tables of malicious entries.
- Audit .htaccess and wp-config.php files.
- Remove unauthorized user accounts.
- Delete auto-generated spam pages.
- Install a Web Application Firewall (WAF).
- Submit a reconsideration request to Google (if penalized).
- Use GSC to request the removal of spam URLs.
Medium-Term (Week 2-3):
- Monitor GSC for a decrease in indexed spam pages.
- Check server logs for ongoing suspicious activity.
- Implement 2FA for all users.
- Disable file editing in the dashboard.
- Review and remove unused plugins and themes.
Long-Term (Ongoing):
- Schedule weekly off-site backups.
- Set up uptime and security monitoring alerts.
- Conduct monthly security audits.
- Review user access levels quarterly.
- Keep a log of all site changes.
What exactly is the Japanese keyword hack, and how does it infect WordPress?
It is a type of SEO spam where hackers inject Japanese text and links into your site to sell counterfeit goods. It typically infects WordPress sites through outdated plugins, weak passwords, or vulnerable themes.
How do I know if my WordPress site has been hit by the Japanese keyword hack?
The clearest sign is seeing Japanese characters in your search engine results title tags or descriptions. You might also see strange URLs in your sitemap or new user accounts in your dashboard.
What’s the quickest way to remove the Japanese keyword hack from my WordPress site?
The fastest method involves restoring a clean backup from before the infection. If no backup exists, using a professional malware removal service or a premium security plugin to scan and clean files is the next fastest route.
Can I fix the Japanese keyword hack myself or do I need professional help?
If you are comfortable with FTP, database queries (SQL), and server configurations, you can fix it yourself. However, if you miss one hidden backdoor, the infection will return. Professional help is recommended for non-technical users.
Why does my site still show Japanese spam in Google results even after I deleted the pages?
Google takes time to “recrawl” and update its index. The spam pages still exist in Google’s memory. Use the “Removals” tool in Search Console to speed up this process, but patience is required.
How did hackers add themselves to my Google Search Console and how do I remove them?
Hackers upload an HTML verification file to your server to prove “ownership” to Google. To remove them, delete the verification file from your server via FTP, then go to GSC Settings > Users and remove their email access.
Will my SEO rankings recover after removing the Japanese keyword hack?
Yes, in most cases, rankings recover, but it is not immediate. It typically takes 2-6 weeks for Google to trust your site again. The faster you clean the site, the better your chances of full recovery.
What vulnerabilities allow the Japanese keyword hack to infect WordPress in the first place?
The most common culprits are outdated plugins, plugins that are no longer maintained by developers, weak administrative passwords, and poor hosting security environments.
How can I prevent the Japanese keyword hack from happening again after removal?
Install a Web Application Firewall (WAF), enforce strong passwords and 2FA, keep all software updated automatically, and choose a secure hosting provider.
How much does it cost to fix a Japanese keyword hack on WordPress?
Costs vary. DIY is free but time-consuming. Premium plugins cost $100-$200/year. Professional agency removal services typically range from $200 to $1,000, depending on the severity and guarantee provided.
Get Your Site Back with Get Shielded Agency
Don’t let a hack destroy years of hard work. If the steps above feel overwhelming, or if you have tried to clean the site only to see the spam return, you need professional intervention.
Get Shielded Agency is the #1 WordPress Security Service Provider specializing in hack recovery. We don’t just clean sites; we restore businesses.
- Expert Hack Recovery: We bring 15+ years of specialized experience in Japanese keyword hack removal.
- Guaranteed Results: We offer 100% malware removal or your money back.
- Fast Recovery: We know every minute counts. Our average turnaround time for a clean site is just 3-7 days.
- Complete Protection: Our service includes deep database cleaning, Search Console reclamation, firewall setup, 2FA implementation, and post-recovery audits.
Stop the traffic loss and protect your reputation.





