By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables
Tech News

WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

By Viral Trending Content 5 Min Read
Share
SHARE
WordPress Skimmers

Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages by inserting malicious JavaScript code into a database table associated with the content management system (CMS).

“This credit card skimmer malware targeting WordPress websites silently injects malicious JavaScript into database entries to steal sensitive payment details,” Sucuri researcher Puja Srivastava said in a new analysis.

“The malware activates specifically on checkout pages, either by hijacking existing payment fields or injecting a fake credit card form.”

The GoDaddy-owned website security company said it discovered the malware embedded into the WordPress wp_options table with the option “widget_block,” thus allowing it to avoid detection by scanning tools and persist on compromised sites without attracting attention.

Cybersecurity

In doing so, the idea is to insert the malicious JavaScript into an HTML block widget through the WordPress admin panel (wp-admin > widgets).

The JavaScript code works by checking if the current page is a checkout page and ensures that it springs into action only after the site visitor is about to enter their payment details, at which point the it dynamically creates a bogus payment screen that mimics legitimate payment processors like Stripe.

The form is designed to capture users’ credit card numbers, expiration dates, CVV numbers, and billing information. Alternately, the rogue script is also capable of capturing data entered on legitimate payment screens in real-time to maximize compatibility.

The stolen data is subsequently Base64-encoded and combined with AES-CBC encryption to make it appear harmless and resist analysis attempts. In the final stage, it’s transmitted to an attacker-controlled server (“valhafather[.]xyz” or “fqbe23[.]xyz”).

The development comes more than a month after Sucuri highlighted a similar campaign that leveraged JavaScript malware to dynamically create fake credit card forms or extract data entered in payment fields on checkout pages.

The harvested information is then subjected to three layers of obfuscation by encoding it first as JSON, XOR-encrypting it with the key “script,” and finally using Base64-encoding, prior to exfiltration to a remote server (“staticfonts[.]com”).

“The script is designed to extract sensitive credit card information from specific fields on the checkout page,” Srivastava noted. “Then the malware collects additional user data through Magento’s APIs, including the user’s name, address, email, phone number, and other billing information. This data is retrieved via Magento’s customer-data and quote models.”

The disclosure also follows the discovery of a financially-motivated phishing email campaign that tricks recipients into clicking on PayPal login pages under the guise of an outstanding payment request to the tune of nearly $2,200.

“The scammer appears to have simply registered an Microsoft 365 test domain, which is free for three months, and then created a distribution list (Billingdepartments1[@]gkjyryfjy876.onmicrosoft.com) containing victim emails,” Fortinet FortiGuard Labs’ Carl Windsor said. “On the PayPal web portal, they simply request the money and add the distribution list as the address.”

What makes the campaign sneaky is the fact that the messages originate from a legitimate PayPal address (service@paypal.com) and contain a genuine sign in URL, which allows the emails to slip past security tools.

To make matters worse, as soon as the victim attempts to login to their PayPal account about the payment request, their account is automatically linked to the email address of the distribution list, permitting the threat actor to hijack control of the account.

In recent weeks, malicious actors have also been observed leveraging a novel technique called transaction simulation spoofing to steal cryptocurrency from victim wallets.

Cybersecurity

“Modern Web3 wallets incorporate transaction simulation as a user-friendly feature,” Scam Sniffer said. “This capability allows users to preview the expected outcome of their transactions before signing them. While designed to enhance transparency and user experience, attackers have found ways to exploit this mechanism.”

WordPress Skimmers

The infection chains involve taking advantage of the time gap between transaction simulation and execution, permitting attackers to set up fake sites mimicking decentralized apps (DApps) in order to carry out fraudulent wallet draining attacks.

“This new attack vector represents a significant evolution in phishing techniques,” the Web3 anti-scam solution provider said. “Rather than relying on simple deception, attackers are now exploiting trusted wallet features that users rely on for security. This sophisticated approach makes detection particularly challenging.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

We Hand-Picked the 24 Best Deals From the 2025 REI Anniversary Sale

Goodbye, Apple Watch. I Can’t Live Without This Rival Smartwatch

AI and the movement of IT professionals into leadership roles

‘Fortnite’ Players Are Already Making AI Darth Vader Swear

Google Pixel 9 Pro vs Samsung Galaxy S25 Ultra: Camera Comparison Review

TAGGED: #E-Commerce, cryptocurrency, Cyber Security, Cybersecurity, Internet, JavaScript, Malware, Payment Security, phishing, web security, web3, WordPress
Share This Article
Facebook Twitter Copy Link
Previous Article €29bn mega-airport announced: Set to welcome 34 million passengers – and it’s not where you think!
Next Article With South Korea in Crisis, Eight Justices Will Decide President’s Fate
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Trump Insults Bruce Springsteen, Taylor Swift
World News
We Hand-Picked the 24 Best Deals From the 2025 REI Anniversary Sale
Tech News
Ralph Fiennes: Pics of the Actor Playing Snow in ‘Sunrise on the Reaping’
Celebrity
Dogecoin ETF Race Heats Up As SEC Acknowledges 21Shares Filing
Crypto
The 76ers are ‘expected’ to listen to trade offers for the #3 pick in the 2025 NBA draft
Sports
U.S. debt no longer earns a top grade at any of the major credit rating agencies after Moody’s downgrade
Business
Pope Leo's childhood home now up for auction
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Trump Insults Bruce Springsteen, Taylor Swift

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Trump Insults Bruce Springsteen, Taylor Swift
May 17, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?