Suspicious URLs being loaded after hack and restore

If you’re using the same database, then the hack code is sometimes stored in there. The pharma hack uses this technique. Ensure that you have a clean database that you’re installing into also.

tech