Viewing 3 replies - 1 through 3 (of 3 total)
  • Plugin Author Sygnoos

    (@sygnoos)

    Hi @kyodev ,

    Please follow the instructions below:

    1) Cou please make sure you have updated the plugin to the latest version 3.64.1.
    2) Inside the popup settings from ‘Custom JS or CSS’ https://prnt.sc/rgcdqa please remove all unknown codes and save the popup.

    We are sorry for any inconvenience.

    Plugin Support Sygoos Support Team

    (@sygnoossupportteam)

    Hi @kyodev,

    How are you today?
    We are wondering whether everything is fine on your end.
    Moreover, after the last update (3.65) which was implemented due to the security reasons, the custom JS scripts were deleted.
    This was intentional update which we had to do in order to keep the websites of our customers safe and secure.
    Please try to add them again and let us know in case of any questions.
    Our team is apologizing and we hoping that our customers can be understanding due to the circumstances.

    Thread Starter kyodev

    (@kyodev)

    sorry for the response time
    (many work in France presently)

    I did not delete the plugin correctly (I guess I used wp delete instead of wp uninstall)

    new test with the initial database and version 3.64.1 :

    1. wp plugin uninstall --deactivate popup-builder works fine and the database is properly cleaned

    2. manual method by removing js code is ok too

    for information:
    my character string to search was: dest.collectfasttracks.com

    `
    wp db search ‘String.fromCharCode(104,116,116,112,115,58,47,47,100,101,115,116,46,99,111,108,108,101,99,116,102,97,115,116,116,114,97,99,107,115,46,99,111,109’

    `
    grep -Iinrl ‘https://dest.collectfasttracks.com/’ wp-content/
    wp-content/themes/xxx/header.php
    `

Viewing 3 replies - 1 through 3 (of 3 total)
  • The topic ‘malware with’ is closed to new replies.