Thread Starter
willnv
(@willnv)
I solved the issue.
Updating the plugin and changing the trigger back to click on your popup WILL NOT SOLVE THE PROBLEM. Memorize the post ID for the popup, and completely delete the it (remove from trash afterwards), and make sure the DB settings for that popup are gone:
Access your database and in the wp_post_meta table, search for the rows associated to your compromised popup ID and make sure there is no data. The malicious code lives inside sg_popup_scripts and sg_popup_options row.
If you need help with this email me at [email protected]
Hi,
Thank you very much for the tip that worked.
Indeed after the infection, even if the plugin is updated it still remains in the database and the malicious code is still active.
With the solution you gave it worked for me.
Julian
My column names differed slightly from what was mentioned above. A query like this may help root out any others:
SELECT * FROM wp_postmeta
WHERE meta_value LIKE '%atob%' OR meta_value LIKE '%eval%'
This looks for the JavaScript atob() or eval() function calls. I found that I could simply delete these rows from wp_postmeta without deleting the entire entry, but that may not be best practice…
-
This reply was modified 1 year, 10 months ago by
Town Nerd.