Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » WordPress skimmers avoid detection by inserting themselves into database tables
Global Security

WordPress skimmers avoid detection by inserting themselves into database tables

AdminBy AdminJanuary 13, 2025No Comments4 Mins Read
WordPress Skimmers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


WordPress skimmers

Cyber ​​security researchers are warning about the emergence of a new stealth credit card skimmer company which targets WordPress e-commerce pages by inserting malicious JavaScript code into a database table linked to the content management system (CMS).

“This credit card skimmer malware targeting WordPress websites silently injects malicious JavaScript into database records to steal sensitive payment details,” Sucuri researcher Pooja Srivastava said in a new analysis.

“The malware is activated specifically on checkout pages, either by hijacking existing payment fields or by entering a fake credit card form.”

Website security company owned by GoDaddy says it has discovered malware embedded in WordPress wp_options table with the “widget_block” option, which allows you to avoid detection by scanning tools and stay on hacked sites without attracting attention.

Cyber ​​security

The idea here is to inject malicious JavaScript into an HTML block widget via the WordPress admin panel (wp-admin > widgets).

The JavaScript code works by checking if the current page is a payment page and ensures that it only fires after the site visitor is about to enter their payment details, at which point it dynamically creates a fake payment screen that mimics legitimate payment processors like the Strip.

The form is designed to record users’ credit card numbers, expiration dates, CVV numbers, and payment information. Alternatively, the fake script is also capable of capturing data entered on legitimate payment screens in real-time for maximum compatibility.

The stolen data is then Base64 encoded and combined with AES-CBC encryption to appear harmless and resist analysis attempts. In the final step, it is transferred to a server controlled by the attacker (“valhafather(.)xyz” or “fqbe23(.)xyz”).

The development comes more than a month after Sucuri highlighted a similar company that used JavaScript malware to dynamically generate fake credit card forms or extract data entered into payment fields on payment pages.

The collected information is then subjected to three levels of obfuscation: first, it is JSON-encoded, XOR-encrypted with the “script” key, and finally Base64-encoded before being sent to the remote server (“staticfonts(.)com” . “).

“The script is designed to extract sensitive credit card information from certain fields on the checkout page,” Srivastava noted. “The malware then collects additional user data through the Magento API, including username, address, email address, phone number and other payment information. This data is extracted using Magento’s customer and quote data models.”

The disclosure also follows the discovery of a financially motivated phishing email campaign that tricked recipients into clicking on PayPal login pages under the guise of an outstanding payment request amounting to nearly $2,200.

“It appears that the scammer simply registered a Microsoft 365 test domain, which is free for three months, and then created a mailing list (Billingdepartments1(@)gkjyryfjy876.onmicrosoft.com) containing victims’ emails,” said Carl Windsor of Fortinet FortiGuard Labs. said. “On PayPal’s web portal, they just ask for money and add a mailing list as an address.”

What makes the campaign insidious is that the messages originate from a legitimate PayPal address (service@paypal.com) and contain a valid character in the URL that allows the email to slip past security tools.

To make matters worse, once a victim tries to log into their PayPal account to request a payment, their account is automatically linked to an email address on the mailing list, allowing the threat actor to take control of the account.

In recent weeks, attackers have also been seen using a new technique called transaction simulation to steal cryptocurrency from victim wallets.

Cyber ​​security

“Modern Web3 wallets include transaction simulation as a convenient feature,” Scam Sniffer said. “This capability allows users to preview the expected outcome of their transactions before signing them. Although designed to improve transparency and user experience, attackers have found ways to exploit this mechanism.”

WordPress skimmers

Infection chains involve exploiting the time gap between simulation and transaction execution, allowing attackers to create fake sites that mimic decentralized applications (DApps) to perform fraudulent wallet withdrawal attacks.

“This new attack vector represents a significant evolution in phishing techniques,” said anti-fraud solutions provider Web3. “Instead of relying on simple deception, attackers are now leveraging robust wallet features that users rely on for security. This sophisticated approach makes detection particularly challenging.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.