New Stealthy Credit Card Skimmer Campaign Targets WordPress E-commerce Checkout Pages
Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages by inserting malicious JavaScript code into a database table associated with the content management system (CMS).
How the Malware Works
The malware activates specifically on checkout pages, either by hijacking existing payment fields or injecting a fake credit card form. According to Sucuri researcher Puja Srivastava, "This credit card skimmer malware targeting WordPress websites silently injects malicious JavaScript into database entries to steal sensitive payment details."
Exploiting WordPress Mechanisms
The GoDaddy-owned website security company said it discovered that attackers have found ways to exploit the mechanism of enhancing transparency and user experience, which has been introduced to WordPress. This mechanism allows attackers to set up fake sites mimicking decentralized apps (DApps) in order to carry out fraudulent wallet draining attacks.
Sophisticated Phishing Techniques
The new attack vector represents a significant evolution in phishing techniques. Rather than relying on simple deception, attackers are now exploiting trusted wallet features that users rely on for security. This sophisticated approach makes detection particularly challenging.
Detection Challenges
The infection chains involve taking advantage of the time gap between transaction simulation and execution, permitting attackers to set up fake sites mimicking decentralized apps (DApps) in order to carry out fraudulent wallet draining attacks.
Conclusion
The new stealthy credit card skimmer campaign targeting WordPress e-commerce checkout pages is a significant threat to online security. It highlights the need for users to stay vigilant and take necessary precautions to protect their sensitive payment details.
Stay Safe Online
If you found this article interesting, follow us on Twitter and LinkedIn to read more exclusive content we post.