New Malware Aims at WooCommerce Websites with Harmful Plugins to Steal Credit Card Information

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

A Sophisticated Malware Campaign Targets WooCommerce Sites

A formidable malware initiative has surfaced, specifically aimed at WordPress e-commerce platforms, with a pronounced focus on those utilizing the WooCommerce plugin for customer transactions.

Discovered in August 2025, this threat exemplifies remarkable evasion abilities alongside intricate mechanisms for credit card data harvesting, meticulously designed to circumvent traditional security detection systems.

Functioning as a deceptive WordPress plugin, the malware employs bespoke encryption protocols, concealing its nefarious payload within counterfeit image files, and establishes a durable backdoor infrastructure. This allows attackers to deploy supplementary code as necessary.

Installation mandates administrative-level access, which is often secured through compromised credentials or inadequately protected plugins.

Upon activation, the malware eludes capture by the WordPress plugin directory, significantly diminishing detection risks while systematically establishing tracking cookies and logging administrator details throughout the compromised site.

Analysts from Wordfence successfully identified and cataloged the malware following the receipt of a comprehensive sample on August 21, 2025.

Between August 27 and September 9, 2025, four detection signatures were developed and disseminated to Wordfence Premium, Care, and Response clientele, with complimentary users receiving access after a standard 30-day interval.

This encroaching menace poses a significant threat to online merchants and their clientele, as it meticulously captures and exfiltrates sensitive payment data.

Advanced Persistence and Command-and-Control Infrastructure

The malware establishes formidable resilience through multiple redundancy layers. It intercepts user credentials during the login process, employing the wp_authenticate_user filter and wp_login action hooks, subsequently exfiltrating this data to servers controlled by the attackers.

The payload injection process relies on counterfeit PNG files embedded with reversed and encoded JavaScript, scattered across three distinct files: a custom payload updated via AJAX backdoor, a dynamic payload refreshed daily, and a fallback static version.

Activated on WooCommerce checkout pages, the JavaScript skimmer employs a three-second delay to avert form conflicts. It attaches event listeners to capture credit card numbers, expiration dates, and CVV values, and thereafter transmits this information through AJAX POST requests.

Analyzing ASSA ABLOY Stock Following Record Peaks and Recent Digital Security Growth in 2025

The PHP exfiltration component incorporates numerous fallback mechanisms—native cURL, file_get_contents, system shell curl, and email delivery—ensuring that captured data reaches attackers via diverse server environments.

Analysis ties this malware to Magecart Group 12, corroborated by the SMILODON identifier located in command-and-control server URLs and coding patterns consistent with previous threat actor endeavors.

This campaign underscores the persistent nature of threats facing WordPress e-commerce platforms and accentuates the imperative of maintaining an updated security infrastructure alongside vigilant monitoring systems.

Source link: Cybersecuritynews.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading