Skip to main content

New Stealthy Credit Card Skimmer Campaign Targets WordPress E-commerce Checkout Pages

Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages by inserting malicious JavaScript code into a database table associated with the content management system (CMS).

How the Malware Works

The malware activates specifically on checkout pages, either by hijacking existing payment fields or injecting a fake credit card form. According to Sucuri researcher Puja Srivastava, "This credit card skimmer malware targeting WordPress websites silently injects malicious JavaScript into database entries to steal sensitive payment details."

Exploiting WordPress Mechanisms

The GoDaddy-owned website security company said it discovered that attackers have found ways to exploit the mechanism of enhancing transparency and user experience, which has been introduced to WordPress. This mechanism allows attackers to set up fake sites mimicking decentralized apps (DApps) in order to carry out fraudulent wallet draining attacks.

Sophisticated Phishing Techniques

The new attack vector represents a significant evolution in phishing techniques. Rather than relying on simple deception, attackers are now exploiting trusted wallet features that users rely on for security. This sophisticated approach makes detection particularly challenging.

Detection Challenges

The infection chains involve taking advantage of the time gap between transaction simulation and execution, permitting attackers to set up fake sites mimicking decentralized apps (DApps) in order to carry out fraudulent wallet draining attacks.

Conclusion

The new stealthy credit card skimmer campaign targeting WordPress e-commerce checkout pages is a significant threat to online security. It highlights the need for users to stay vigilant and take necessary precautions to protect their sensitive payment details.

Stay Safe Online

If you found this article interesting, follow us on Twitter and LinkedIn to read more exclusive content we post.




Source Link