A new credit card skimmer malware targeting WordPress e-commerce sites has been identified. The malicious JavaScript is injected into database tables and activates specifically on checkout pages, making it difficult for traditional detection tools to identify. Reports indicate that over 5,000 WordPress sites have been affected by this malware campaign. Researchers from Sucuri Security noted that the stealthy nature of the malware allows it to evade typical security measures, posing a risk to sensitive payment information.
A recently discovered @WordPress credit card skimmer malware was found to be hidden as a table entry in a compromised website’s database, making it difficult to detect using traditional methods, @sucurisecurity researchers described. #cybersecurity https://t.co/m3y66wgOmO
Over 5,000 WordPress sites caught in https://t.co/GJp1HKVHdQ malware attack https://t.co/WjRI2ssgrV
Credit Card Skimmer campaign targets WordPress via database injection: https://t.co/5pXG5A6DB6 by Security Affairs #infosec #cybersecurity #technology #news