@compuchenna Thank you so much. Been searching my databases and found references to linkangood in 3 of 10 and the below I found in information_schema / processlist. I actually found one new mention of linkangood in the new installation I did a couple of hours ago as well so it is as you explained, it injects itself again. I am grateful for you taking the time to explain all this.
But what can I do from now on? Is this harmless?
I run a web shop that sells products and I am linked to both Paypal and Stripe for credit cards. I don’t use ads at all so I really don’t care if they steal my ad space.
The two things I am worried about are, can they steal my secret codes that are used for payments that are inserted into woo commerce and thereby get access to my accounts? And can this make Google punish my site for ranking, having all this browser adware inserted into my site?
Not expecting you to have answers to all of this but any insight would be much appreciated.
Thank you again..
SELECT * FROM information_schema
.PROCESSLIST
WHERE (CONVERT(ID
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(USER
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(HOST
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(DB
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(COMMAND
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(TIME
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(STATE
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(INFO
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(TIME_MS
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(STAGE
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(MAX_STAGE
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(PROGRESS
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(MEMORY_USED
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(EXAMINED_ROWS
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(QUERY_ID
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(INFO_BINARY
USING utf8) LIKE ‘%linkangood%’ OR CONVERT(TID
USING utf8) LIKE ‘%linkangood%’)