The SiteLock + Bluehost/HostGator Malware Upsell: How the Scam Works The SiteLock + Bluehost/HostGator Malware Upsell: How the Scam Works — Hosting article on LaunchPad Host HOSTING The SiteLock + Bluehost/HostGator Malware Upsell: How the Scam Works LaunchPad Host 11 min read
The SiteLock + Bluehost/HostGator Malware Upsell: How the Scam Works — Hosting guide on LaunchPad Host

The SiteLock + Bluehost/HostGator Malware Upsell: How the Scam Works

PM
By Priya Menon · Infrastructure Lead
Published April 19, 2026 · 11 min read

Key Takeaways

  • Bluehost, HostGator, iPage, Site5, FatCow, Constant Contact and ~70 other brands are Newfold Digital (rebranded EIG) — same company, same support infrastructure, same SiteLock pipeline.
  • SiteLock cleanup quotes documented: $199 base, $300 typical, $500 for two domains, $720 annual, and one reported case demanding $5,250 more after initial service.
  • BBB has hundreds of complaints specifically about SiteLock billing and false-positive malware flags tied to EIG hosts.
  • Third-party security researchers (White Fir Design) have documented cases where SiteLock flagged sites that were genuinely clean — and continued sending warnings months after the user left the host.
  • Moving off Newfold-owned hosts is the only structural fix. Staying and paying for SiteLock does not solve the underlying incentive problem.

The ownership structure you're not told about at signup

Understanding why this happens requires understanding who owns what.

Endurance International Group (EIG) → Newfold Digital
Formed by private-equity rollup in 2011. Acquired Bluehost (2010), HostGator (2012), iPage, FatCow, A Small Orange, Site5, Constant Contact, Arvixe, JustHost, Hostmonster, and dozens more over the following decade. Rebranded to Newfold Digital in 2021 after persistent customer complaints associated the EIG name with cost-cutting and support decline.
SiteLock
Founded as a separate company, but according to multiple industry sources (White Fir Design has the most detailed documentation) one of SiteLock's principal owners was simultaneously in a CEO role at EIG during the period of the tightest revenue-sharing partnerships. SiteLock is now a separate entity under different ownership, but the established referral pipeline from Newfold hosts to SiteLock remains the documented source of most complaints.
The revenue-sharing contract
Multiple industry write-ups reference a ~55% revenue share flowing from SiteLock back to the referring Newfold host. This is the incentive structure that makes false-positive flags profitable rather than merely embarrassing.

None of this is illegal. It becomes a consumer-protection issue when the host's "independent" malware warning is economically equivalent to a commissioned sales call.

The pattern, step by step

  1. Email arrives: "We have detected potential malware on your site." The email sounds urgent and technical. Wording references specific-sounding threats like "shell script," "backdoor," or "phishing kit."
  2. Site may or may not be suspended. Sometimes the site stays up but with warnings on future visits; sometimes it's immediately suspended with a 503 page.
  3. Phone call within 24 hours from a "security specialist." The call follows a scripted pattern: acknowledgment of the problem, urgency framing ("your visitors may be infected"), and a recommendation for SiteLock.
  4. Initial quote: $199-$500. Pressure to purchase immediately to prevent "further damage."
  5. Service begins, and in documented cases: (a) the site stays broken, (b) malware isn't found, (c) the customer is asked for additional payment for directories or extra domains.
  6. False-positive confirmation: some customers have escalated to Bluehost/HostGator tier-2 support and been told there was no malware after all — but by then the SiteLock charge has cleared.
  7. Warnings continue: some users have reported SiteLock warnings months after leaving the host entirely, raising questions about whether flagging is based on actual scans or commercial lists.

Specific cases with dollar amounts

These are documented cases from security-industry blogs, forums, and complaints boards. Not rumors — named sources with dates.

CaseInitial quoteActual outcomeSource
HostGator customer, extortion-style escalation$500 for 2 domains (cleanup promised)Sites inaccessible within 24 hours of service start; SiteLock demanded additional $5,250 to scan 19 more directories; customer wrote "This is not a professional team that works together."White Fir Design blog, Oct 2024 review
Bluehost customer, 6 weeks of downtimeSiteLock monitoring included with hosting bundleSite went down repeatedly despite monitoring; only generic automated emails every two days; characterized as "mediocre or nonexistent."White Fir Design blog
GoDaddy customer, spam complaint$199 demanded after single spam reportCustomer described as "one spam complaint" triggering the charge; no cleanup, no investigation described.Warrior Forum discussion
HostGator customer, 25 days of silent suspensionSiteLock upsell, amount variesAccount suspended for 25 days over malware claim; tier-2 support later confirmed no malware existed.Documented in multiple forum threads
SiteLock "911" emergency removal$199 one-timeLinks removed from blog posts that did not require cleanup; customer paid because "911" framing implied urgency.White Fir Design, BBB complaints

The range of quotes varies wildly: $199 to $5,250 within the same ecosystem. This variance is itself a signal — legitimate cleanup services have predictable pricing based on site size. Wildly variable quotes suggest the number is whatever the customer appears able to pay.

Tired of slow, overcrowded shared hosting?

LaunchPad Host runs on NVMe SSDs + LiteSpeed with free migration, free SSL, daily backups, and crypto payments. 30-day money-back guarantee.

See Hosting Plans

What BBB complaints actually document

The Better Business Bureau maintains a complaint record for SiteLock. The patterns (from public-facing complaint summaries):

BBB complaints are not proof of wrongdoing — they're a record of customer frustration. But the volume (hundreds of complaints over many years) and the consistency of themes (false positives, billing issues, high-pressure sales) aligns with the independent security researcher findings. That convergence is why we're willing to call this a documented pattern rather than a collection of anecdotes.

When the malware is real: the clean path

Sometimes the flag is right. Your WordPress install got compromised, there's a real shell in wp-content/uploads, and something needs to happen. Here's the non-scammy path:

  1. Verify independently. Run your site through at least two of: Sucuri SiteCheck (free, not the paid product), VirusTotal URL scanner, Google Safe Browsing diagnostics, Wordfence scan. If all three are clean and your host's SiteLock flag is the only warning, it's almost certainly a false positive.
  2. If real: clean manually or hire a flat-fee pro. Wordfence Premium ($119/year) includes human-assisted cleanup. Malcare offers $99 one-time cleanup. Sucuri's own direct service (not through GoDaddy) is $199-$499 one-time, and they're a legitimate security company — just don't buy their product through the GoDaddy referral.
  3. Replace all plugins with clean copies from wordpress.org. Don't trust any file on the server. Re-upload WordPress core, re-install themes from the official source.
  4. Rotate every credential. WP admin password, database password (via wp-config), SFTP/SSH, hosting panel, any API keys.
  5. Figure out the root cause. Usually an outdated plugin with a known RCE, a weak admin password that got brute-forced, or a shared-hosting neighbour with a worse problem. If you don't fix the root cause, you'll re-infect within weeks.

The honest market rate for a one-time WordPress malware cleanup is $99-$300. Anything substantially above that is an upsell, not a service.

How to escape the Newfold ecosystem

The only structural fix is leaving. Staying on Bluehost/HostGator and "just not buying SiteLock" doesn't help — the next suspension pushes you back into the same pipeline.

The Newfold Digital brand list (partial, as of 2026)

Bluehost, HostGator, iPage, FatCow, JustHost, Site5, Hostmonster, A Small Orange, Arvixe, TypePad, Domain.com, MOJO Marketplace, Constant Contact (email marketing — separate issue but same parent), Yoast (acquired 2021), and many smaller white-labels. If you're considering a new host and their pricing looks suspiciously like Bluehost/HostGator, check the WHOIS of their billing/support domains — Newfold brands share infrastructure.

Migration checklist

  1. Pick a non-Newfold host. Privacy-first options (like LaunchPad Host) or reputable independents (SiteGround has its own issues but isn't Newfold; A2 Hosting is independent; Cloudways for managed).
  2. Backup your site offsite before touching the Newfold account. UpdraftPlus to Backblaze B2 or similar — do not use the host's native backup, which lives on the same account.
  3. Verify the backup by restoring it locally (LocalWP or a test VPS) before you trust it.
  4. Stand up the site at the new host on a temporary subdomain or hosts-file entry. Make sure it works.
  5. Update DNS (via Cloudflare, not via the old host's DNS) to point at the new host.
  6. After 48 hours of the new site serving cleanly, cancel the Newfold account. Get the cancellation in writing.
  7. Dispute auto-renewals on your card issuer if they occur — Newfold brands have documented auto-renewal issues. Card issuers side with customers on "service cancelled but charged" disputes.

LaunchPad Host is designed as a specific alternative to this ecosystem: fixed pricing (no renewal cliff), no security-product kickbacks (we don't resell SiteLock, Sucuri, or anyone else — our Scale plan includes ModSecurity + Imunify360 at the server level, already paid for), and documented incident response instead of a phone call from a "security specialist" reading a script. Compare that to the pattern above and pick accordingly.

Frequently Asked Questions

No. There is no credible evidence any mainstream host deliberately plants malware. What IS documented: (a) false-positive flags where no malware exists, (b) slow patching of real vulnerabilities that let third-party attackers infect sites, and (c) the FTC's 2025 action against GoDaddy for "lax data security" that enabled real breaches on customer sites. The problem is incentive misalignment plus bad security — not deliberate planting.

The core product (vulnerability scanning, malware removal) is a real service. The issue is the delivery model: false-positive flags, aggressive upselling, price variability, billing practices that prompted hundreds of BBB complaints. A security product sold without predatory sales tactics is fine; the SiteLock-via-EIG pipeline has repeatedly crossed that line.

Sucuri is a legitimate security company and was a respected brand in the WordPress security community. GoDaddy acquired them in 2017. The Sucuri product sold directly (sucuri.net) is still reasonably regarded. The GoDaddy Website Security product "powered by Sucuri" has more complaint volume — same technical engine, different sales pressure.

$99-$300 is the honest range for a one-time cleanup of a typical WordPress site. Wordfence Premium includes human-assisted response at $119/year. Malcare is $99 one-time. Direct Sucuri is $199-$499. If you're quoted significantly more, get a second opinion before paying.

Hard but possible. Steps: (1) get the original flag report in writing from your host, (2) scan the affected site with Sucuri SiteCheck, Wordfence, and Google Safe Browsing and save the results, (3) file a BBB complaint — SiteLock responds to these, (4) if you paid by card within the last 60-90 days, initiate a chargeback citing "service not rendered as described," (5) if you're mid-subscription, cancel auto-renewal immediately through your bank, not through SiteLock.

The revenue-sharing relationship has evolved and specifics are proprietary. Newfold now offers multiple security products beyond SiteLock (including "Newfold Web Security" and resold options). The referral pattern and upsell pressure during malware suspensions remain documented in recent reviews. Regardless of which specific security vendor Newfold is currently pushing, the underlying conflict — host flagging → upsell revenue — is the structural problem.

Not automatically. Some small offshore hosts also resell security products. What matters is (a) whether the host has revenue-share deals with the security vendor, and (b) whether they publish their security stack up front. Ask directly: "Do you receive commission from any security product you recommend?" A host that answers no in writing is the baseline; a host that includes enterprise-grade server security in the base plan (like we do with ModSecurity and Imunify360 on Scale) removes the incentive entirely.

First: take the site offline manually (change index.php to a maintenance page) so it doesn't spread. Second: make a full backup of the infected state before cleaning anything — you need it for forensics. Third: run three independent scanners (Sucuri SiteCheck, Wordfence, VirusTotal) to confirm what's actually there. Fourth: either clean it yourself with Wordfence's guided cleanup or hire a flat-fee pro ($99-$300 range). Do NOT pay your host's recommended vendor through their sales pipeline — go direct to the vendor or pick a different one.

Ready for hosting that just works?

NVMe + LiteSpeed hosting with free migration, crypto payments accepted, and a 30-day money-back guarantee.

See Hosting Plans
Tags: sitelock bluehost hostgator eig newfold malware upsell scam

Related tools, articles & authoritative sources

Hand-picked internal pages and external references from sources Google itself considers authoritative on this topic.

Related free tools

Offshore & privacy hosting

Related premium tools