Contact

Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection

NetmanageIT OpenCTI - opencti.netmanageit.com

Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection



SUMMARY :

A sophisticated credit card skimmer malware has been discovered targeting WordPress websites. The malware injects malicious JavaScript into database entries, specifically in the wp_options table, to steal sensitive payment details from checkout pages. It activates only on checkout pages, either hijacking existing payment fields or injecting a fake credit card form. The malware uses Base64 encoding and AES-CBC encryption to obfuscate stolen data before sending it to attacker-controlled servers. This stealthy approach allows the malware to persist undetected on compromised sites, avoiding common file-scanning tools. The attack demonstrates the evolving techniques used by attackers to target sensitive checkout processes in WordPress environments.

OPENCTI LABELS :

wordpress,credit card skimmer,ecommerce,database injection


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


Stealthy Credit Card Skimmer Targets WordPress Checkout Pages via Database Injection