Cyber security news for all

More

    WordPress malware discovers WooCommerce websites for Magecart attacks

    Researchers at website security company Sucuri have discovered new WordPress malware used by threat actors to find and identify the WooCommerce online stores with many customers to be targets for future Magecart attacks.

    WooCommerce is an open-source WordPress plugin with over 5 million active installations. It is designed to simplify the management of e-commerce sites used to “sell anything anywhere.”

    However, attacking the WooCommerce online store is nothing new.

    Plugins with errors for hacking into electronic stores

    To crack the WooCommerce-based online store and drop new malware, hackers are exploiting security holes in other WordPress plugins.

    By exploiting these flaws, they will be able to access the online store’s internal structure and find out whether the site uses the WooCommerce platform. They will then collect and extract information about WooCommerce installation on servers controlled by attackers.

    “It is important to note that, by default, the WooCommerce plugin does not store payment card data-an attacker cannot just steal private payment details from the WordPress database,” the malware researcher said.

    The malware installation is in the form of a malicious PHP script and is part of the exploitation steps after successfully compromising the WordPress site.

    Magecart reconnaissance

    Although Sucuri has not specified the purpose of this information, malware operators can use orders and payment information to decide whether it is worth deploying a skimmer specifically for online stores.

    This will enable them to focus their energy on online stores that receive a lot of traffic and orders, and as a result, avoid wasting time on e-commerce stores that are idle or don’t have many customers.

    Sucuri only observed one of the Magecart campaigns targeting the WooCommerce store just a month ago. They also watched credit card thieves inject a dedicated JavaScript-based card separator that collects card numbers from the card along with credit card security code.

    The WordPress malware will also implement three backdoors on the infected website. This will be very useful if the attacker decides to return and implement a network skimmer.

    Leal concluded: “This malware is a good example of an attacker using unauthorized access to identify potential new targets in a compromised host environment.”

     

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]