Sneaky Skimmers: New WordPress Malware Targets Checkout Pages with Stealthy Card Theft
Cybersecurity researchers have discovered a stealthy credit card skimmer campaign targeting WordPress e-commerce sites. This malware silently injects malicious JavaScript into checkout pages, capturing sensitive payment details. It cunningly evades detection by embedding itself in WordPress database tables, making it a serious threat that even your antivirus might miss.

Hot Take:
Move over, pickpockets! There’s a new card swiper in town, and it’s not even bothering to leave the comfort of its own couch. These cybercriminals are weaving digital webs tighter than a Black Friday checkout line, and WordPress users are the clueless shoppers of this story!
Key Points:
- Cybercriminals are targeting WordPress e-commerce sites with a stealthy credit card skimmer.
- Malware sneaks into the WordPress `wp_options` table, masquerading as a widget block.
- This sneaky skimmer activates during checkout, mimicking payment processors like Stripe.
- Stolen credit card data is encrypted, disguised as harmless and sent to attacker-controlled servers.
- Parallel campaigns involve phishing and cryptocurrency theft via transaction simulation spoofing.
Already a member? Log in here