Cybersecurity researchers have warned about a new credit card skimmer campaign targeting WordPress e-commerce sites. The malware silently injects malicious JavaScript code into the WordPress database, specifically in the wp_options table. This allows the malware to remain undetected by scanning tools while embedding itself in the website’s HTML block widgets through the WordPress admin panel. Once installed, the malware activates only on checkout pages and triggers the creation of a fake payment form that mimics legitimate payment processors such as Stripe.
The malicious script is designed to capture sensitive payment information, including credit card numbers, expiration dates, CVV, and billing details. In addition to creating fake forms, it can also steal data entered into legitimate payment screens in real-time, ensuring its compatibility with various checkout pages. The stolen data is encoded using Base64 and AES-CBC encryption, which helps evade detection and analysis before being transmitted to attacker-controlled servers.
This skimmer campaign is not the first of its kind, as a similar tactic was previously discovered targeting WordPress websites using JavaScript malware. The stolen data is subjected to multiple layers of obfuscation, including encoding it as JSON, XOR-encrypting it, and then Base64-encoding it. Afterward, the data is exfiltrated to remote servers controlled by the attackers, where it can be exploited for financial gain. The attack is part of a larger trend of malicious actors using increasingly sophisticated methods to target WordPress websites and e-commerce platforms.
In a broader context, this campaign follows the discovery of a phishing email attack that tricks recipients into clicking on fake PayPal login links. The scam involves hijacking PayPal accounts after victims log in, further highlighting the ongoing threats facing online users. Additionally, the rise of novel phishing techniques like transaction simulation spoofing has allowed attackers to steal cryptocurrency from victims, further complicating the security landscape. As these threats evolve, organizations and individuals must stay vigilant and adopt multi-layered security measures to protect sensitive data.