• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new credit card skimmer targets wordpress, magento, and opencart sites

New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites

You are here: Home / General Cyber Security News / New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
June 26, 2024

Several content administration process (CMS) platforms like WordPress, Magento, and OpenCart have been qualified by a new credit card web skimmer known as Caesar Cipher Skimmer.

A web skimmer refers to malware that is injected into e-commerce websites with the objective of thieving economical and payment details.

According to Sucuri, the newest campaign entails building malicious modifications to the checkout PHP webpage related with the WooCommerce plugin for WordPress (“form-checkout.php”) to steal credit score card particulars.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“For the earlier couple of months, the injections have been modified to look considerably less suspicious than a extended obfuscated script,” security researcher Ben Martin mentioned, noting the malware’s endeavor to masquerade as Google Analytics and Google Tag Supervisor.

Cybersecurity

Specially, it employs the similar substitution mechanism used in Caesar cipher to encode the malicious piece of code into a garbled string and conceal the external area which is used to host the payload.

It truly is presumed that all the internet websites have been previously compromised as a result of other signifies to phase a PHP script that goes by the names “fashion.css” and “css.php” in an clear exertion to mimic an HTML type sheet and evade detection.

These scripts, in flip, are designed to load yet another obfuscated JavaScript code that makes a WebSocket and connects to one more server to fetch the actual skimmer.

“The script sends the URL of the existing web pages, which enables the attackers to deliver tailored responses for just about every contaminated web-site,” Martin pointed out. “Some variations of the 2nd layer script even examine if it is loaded by a logged-in WordPress user and modify the reaction for them.”

Some versions of the script have programmer-readable explanations (aka responses) published in Russian, suggesting that the menace actors behind the operation are Russian-speaking.

The form-checkout.php file in WooCommerce is not the only strategy employed to deploy the skimmer, for the attackers have also been noticed misusing the authentic WPCode plugin to inject it into the internet site databases.

Cybersecurity

On web-sites that use Magento, the JavaScript injections are performed on database tables these as core_config_data. It’s presently not recognised how this is completed on OpenCart web pages.

Thanks to its common use as a foundation for web sites, WordPress and the greater plugin ecosystem have become a valuable focus on for malicious actors, enabling them uncomplicated entry to a extensive attack area.

It really is essential that web-site homeowners continue to keep their CMS software program and plugins up-to-day, enforce password hygiene, and periodically audit them for the presence of suspicious administrator accounts.

Located this short article attention-grabbing? Adhere to us on Twitter  and LinkedIn to study a lot more distinctive written content we publish.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «new medusa android trojan targets banking users across 7 countries New Medusa Android Trojan Targets Banking Users Across 7 Countries
Next Post: Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping apple patches airpods bluetooth vulnerability that could allow eavesdropping»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.