Industry News
Your Business Website Is Not Too Small to Hack. That Is Exactly Why They Chose It.

Everyone says hackers only go after big targets. Banks, government databases, enterprise platforms with millions of users. Your business website, the one with your services page and a contact form, is not worth their time. You have probably told yourself some version of this. Most business owners have.
It is wrong. And a global malware campaign documented in March 2026 proved it.
250 Sites. 12 Countries. Mostly Small Businesses.
In March, security firm Rapid7 published findings on a campaign that had compromised over 250 websites across 12 countries. The targets included a US Senate candidate's campaign site, regional news publications, and local business websites.
The attackers were not after the businesses themselves. They were after the businesses' visitors.
The campaign, known as ClickFix, injected malicious code into legitimate WordPress sites. When a customer visited a compromised business website, they saw what looked like a standard Cloudflare CAPTCHA verification, the kind you encounter on every second website these days. But instead of proving they were human, the prompt instructed visitors to run a command that downloaded credential-stealing malware onto their machines.
The payloads included Vidar Stealer, Impure Stealer, and something Rapid7 calls the DoubleDonut Loader. These are not theoretical exploits. They steal browser-stored credentials, authentication cookies, and cryptocurrency wallet data from real people visiting real business websites.
The site owners had no idea. Their websites looked normal. Their visitors were being robbed.

Why Small Sites Are the Preferred Target
This is where the myth falls apart completely. Small business websites are not ignored by attackers. They are preferred.
First, unpatched plugins. Patchstack's State of WordPress Security 2026 report found over 11,000 vulnerabilities in the WordPress ecosystem last year, roughly a 42% increase on the previous year. Around 9 in 10 of those sat in plugins. Nearly half were publicly disclosed while the affected plugin was still unpatched. If you are running a WordPress site with six or eight plugins and nobody is monitoring vulnerability disclosures, you are running an open door.
Second, no monitoring. A Waterford manufacturer running a trade catalogue site does not have a security operations centre. They do not have intrusion detection. Most do not even have uptime alerts. When a site gets compromised, it can sit there silently distributing malware for weeks before anyone notices. The ClickFix campaign ran for months before Rapid7 documented it.
Third, trust. Search engines and email filters give established small business domains more trust than newly registered ones. A hacker who compromises your three-year-old business domain inherits that reputation. Your domain becomes the delivery vehicle precisely because it looks legitimate.
Your Website Becomes the Weapon
This is the part that most business owners do not think about. The risk is not just to your data or your site. When your WordPress site gets compromised by a campaign like ClickFix, your website attacks your customers.
Their browsers trust your domain. Their antivirus may not flag a download initiated from a site they chose to visit. They entered their credentials thinking they were interacting with your business.
The reputational damage is not theoretical. Google's Safe Browsing flags compromised sites with a full-page warning. Depending on the severity, your domain can end up on security blocklists that take weeks to clear. During our morning operations review last month, we identified three sites on our platform flagged by upstream security scanners for injected scripts, all traced to a single compromised plugin that had been patched upstream but not yet updated on those installations.
We caught them within hours. Without server-level monitoring, they could have sat there for weeks.
What Proper Hosting Security Prevents
Here is the uncomfortable finding from Patchstack's report: the best-performing hosting security stack they tested blocked roughly 60% of attacks. Several hosts using standard combinations of Cloudflare, ModSecurity, and Imunify360 blocked fewer than one in five. One host blocked nothing at all.
For businesses with a dedicated security team managing their own server infrastructure and custom WAF rules, handling WordPress security in-house gives them granular control that a managed platform cannot replicate. That is a genuine advantage at scale. But for the vast majority of local firms and independent retailers, the choice is between managed hosting with server-level security hardening, fail2ban intrusion prevention, and automatic malware scanning, or hoping your shared hosting provider catches something before your customers do.
Server-level security is not a premium add-on. It is the baseline for operating a business website in 2026. Web60 includes it at every tier because there is no version of responsible hosting that does not.
One honest caveat: even managed hosting cannot prevent every compromise. If you install a plugin from an untrusted source or use a nulled theme, that code runs inside your WordPress installation regardless of what sits in front of it. Server-level security catches known attack patterns and blocks malicious traffic. It cannot override decisions made inside the application itself. Know the boundary.
Conclusion
The belief that your business website is too small to hack is not just incorrect. It is the vulnerability itself. Attackers count on it. They count on the unpatched plugin that nobody checked, the absence of monitoring, the assumption that security is someone else's problem.
Patchstack counted over 11,000 WordPress vulnerabilities last year. Rapid7 documented a live campaign exploiting them across 250 sites in 12 countries. This is not a future risk. It is the operating environment your website already sits in.
The practical response is straightforward. Run your site on infrastructure that includes security as a default, not an add-on. Keep plugins updated or use a host that handles updates for you. Verify your backups actually work. And stop assuming a small site is a safe site. The evidence from this year says otherwise.
Sources
Ian oversees Web60's hosting infrastructure and operations. Responsible for the uptime, security, and performance of every site on the platform, he writes about the operational reality of keeping Irish business websites fast, secure, and online around the clock.
More by Ian O'Reilly →Ready to get your business online?
Describe your business. AI builds your website in 60 seconds.
Build My Website Free →More from the blog
The European Accessibility Act Is Now Law. Most Irish Business Websites Are Not Ready.
The European Accessibility Act is now enforceable in Ireland. Here is what the law requires, who is exempt, and what your business website needs to change.
Google Now Scores Your Entire Website on Speed. One Slow Page Drags Everything Down.
Google's March 2026 update now scores Core Web Vitals across your entire site, not page by page. A few slow pages can drag rankings down for your whole domain.
