Is your website suddenly showing tens of thousands of pages with Japanese language, like this?
Image from Reddit
Here’s the bad news: you’ve been effected by the Japanese Keyword Hack.
But good news: here’s a guide to fix it.
The Japanese Keyword Hack, also known as Japanese SEO spam, is a malicious tactic where attackers infiltrate your website to create numerous pages filled with Japanese text and links to fraudulent sites.
These pages are designed to manipulate search engine rankings, often leading to a significant drop in your site’s SEO performance and credibility.
In some cases, hackers may even add themselves as property owners in your Google Search Console to further exploit your site’s settings.
site:yourdomain.com
. If you notice pages with Japanese characters or unfamiliar URLs, it’s a strong indication of the hack.Yes, some plugins—especially outdated or poorly maintained ones—are frequent targets and vectors for these types of attacks. Below are the most commonly exploited plugin categories that can lead to the Japanese Keyword Hack.
Plugins that haven’t received updates in over a year may contain unpatched vulnerabilities. Hackers actively scan for these. If you’re using any plugin that hasn’t been updated recently or shows a warning in the WordPress admin, consider replacing it with a well-maintained alternative.
Plugins that allow users to upload files (contact forms, frontend file managers, etc.) can be dangerous if not coded securely. Improper file validation opens the door to uploading malicious PHP scripts.
Risky examples include:
Some SEO tools and redirection plugins have been abused to inject cloaked spam or redirect Googlebot to malicious pages while showing something normal to users.
Watch out for: Misconfigured or outdated All in One SEO Pack, Rank Math, or sketchy redirection plugins.
Page builders that render shortcodes dynamically can be manipulated to load hidden content. If a plugin allows frontend content creation or editing, it should be heavily locked down.
Risk-prone examples:
If you’ve ever installed a “nulled” or pirated plugin or theme, it may contain a hidden backdoor or malware that activates later. These often inject base64-encoded PHP in files like functions.php
or into random plugin folders.
/wp-content/plugins/
for recent unexpected changes.Before making any changes, ensure you have a complete backup of your website, including files and databases. This precaution allows you to restore your site if needed.
Access your Google Search Console and navigate to the “Users and Permissions” section. Remove any unfamiliar users to prevent further unauthorized access.
.htaccess
, wp-config.php
, and theme files, for any suspicious code or unfamiliar entries.Delete any pages, posts, or files that were added without your knowledge. Ensure that your sitemap is clean and doesn’t contain any of the spammy URLs.
The age-old question. It’s critical to do all of the above to clean up as fast as possible.
From that point on, it’s up to Google when these results reset. It moves at its own pace, so be sure your fixes stick, and then hurry up and wait.
site:yourdomain.com
to detect any anomalies early.The Headless Hostman takes your WordPress site — as-is — and converts it to a Static Version.
This means the Live website is completely decoupled from the database and all of the endpoint that might be typically exposed to these vulnerabilities.
Beyond that, we offer multiple ways to further lockdown your WordPress website including:
Looking for peace of mind for your site? Switching to Static WordPress is your best bet.