BlackOut Dominicana
Boutique hospitality brand
Seven years of compromise reversed inside 48 hours
Client context
U.S.-based entrepreneur with a high-traffic WordPress ecosystem. Long-term compromise infected every visitor touchpoint, siphoned customer trust, and tanked rankings.Threat landscape
- Malware pivoted from the website to the team’s laptops and phones.
- 46,000+ backdoors seeded across WHM, cPanel, WordPress core, plugins, and the database.
- Adult, gambling, and pharma spam links hijacked public posts and SEO equity.
- Phishing campaigns weaponized the brand and infected paying customers.
- Site performance cratered to an “F” despite repeated plugin-based cleanups.
Sycurely response
- Isolated the environment, scrubbed WHM/cPanel accounts, and rebuilt compromised database layers.
- Reinstalled WordPress core with custom tooling and enforced least-privilege controls across plugins.
- Reset DNS, registrar, and MX records to cut off phishing routes and restore domain trust.
- Deployed dedicated firewalls and geo-fencing to defend every sister brand on the server.
- Optimized the entire stack so paid and organic campaigns could relaunch immediately.
Outcome
- Operations stabilized inside 48 hours of kickoff.
- Daily intrusion attempts now blocked at the perimeter.
- Client retained Sycurely for 24/7 monitoring and optimization.
Key insight
Obscure persistence mechanisms hide in WHM/cPanel long after “site-level” scans claim cleanliness. Root access remediation is non-negotiable.
Service stack
- 360° server hygiene
- WordPress hardening + plugin governance
- Threat monitoring & performance optimization