This website uses cookies

Our website, platform and/or any sub domains use cookies to understand how you use our services, and to improve both your experience and our marketing relevance.

✨ Vultr and Linode are back on Cloudways! VIEW PLANS→

New Credit Card Skimmer Exploits WordPress, Magento, and OpenCart

Updated on June 27, 2024

2 Min Read
Caesar Cipher Skimmer targets WordPress, Magento, and OpenCart

A newly identified credit card web skimmer, known as Caesar Cipher Skimmer, is targeting multiple content management systems (CMS) including WordPress, Magento, and OpenCart. This type of malware is designed to infiltrate e-commerce sites to steal financial and payment information.

via GIPHY

Sucuri reports that the skimmer modifies the checkout PHP file associated with the WooCommerce plugin for WordPress (“form-checkout.php”) to capture credit card details. The malware attempts to disguise itself by mimicking Google Analytics and Google Tag Manager, making the injected code less suspicious.

The Caesar Cipher Skimmer uses a substitution mechanism similar to the Caesar cipher to encode its malicious code into a garbled string, concealing the external domain that hosts the payload. The compromised websites appear to have been previously infiltrated, staging PHP scripts named “style.css” and “css.php” to mimic HTML style sheets and avoid detection.

These scripts load another obfuscated JavaScript code that creates a WebSocket connection to fetch the actual skimmer. The script sends the URL of the current web page to attackers, allowing them to send customized responses for each infected site. Some script versions even check if the user is logged into WordPress, modifying the response accordingly. Comments in Russian within the code suggest that Russian-speaking threat actors are behind the operation.

The form-checkout.php file in WooCommerce is not the only entry point. Attackers have also misused the legitimate WPCode plugin to inject the skimmer into the website database. For Magento sites, JavaScript injections occur in database tables such as core_config_data. The method of injection on OpenCart sites remains unknown.

Given the widespread use of WordPress and its plugin ecosystem, these platforms present a lucrative target for attackers. Site owners are urged to keep their CMS software and plugins up-to-date, enforce strong password practices, and regularly audit for suspicious administrator accounts to mitigate these risks.

Share your opinion in the comment section. COMMENT NOW

Share This Article

Start Growing with Cloudways Today.

Our Clients Love us because we never compromise on these

Abdul Rehman

Abdul is a tech-savvy, coffee-fueled, and creatively driven marketer who loves keeping up with the latest software updates and tech gadgets. He's also a skilled technical writer who can explain complex concepts simply for a broad audience. Abdul enjoys sharing his knowledge of the Cloud industry through user manuals, documentation, and blog posts.

×

Thankyou for Subscribing Us!

×

Webinar: How to Get 100% Scores on Core Web Vitals

Join Joe Williams & Aleksandar Savkovic on 29th of March, 2021.

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Want to Experience the Cloudways Platform in Its Full Glory?

Take a FREE guided tour of Cloudways and see for yourself how easily you can manage your server & apps on the leading cloud-hosting platform.

Start my tour

CYBER WEEK SAVINGS

  • 0

    Days

  • 0

    Hours

  • 0

    Mints

  • 0

    Sec

GET OFFER

For 4 Months &
40 Free Migrations

For 4 Months &
40 Free Migrations

Upgrade Now