Phishing

New WordPress Plugin That Weaponizes Legit Sites To Steal Customer Payment Data

Cybercriminals have developed PhishWP, a malicious WordPress plugin, to facilitate sophisticated phishing attacks, which enable attackers to create convincing replicas of legitimate payment gateways, such as Stripe, on compromised or fraudulent WordPress websites. 

By seamlessly integrating with Telegram, PhishWP facilitates real-time data exfiltration, including credit card details, personal information, and even 3DS authentication codes. 

This allows attackers to bypass security measures and execute fraudulent transactions with increased efficiency, posing a significant threat to online users and businesses alike.

Official advertisement for PhishWP

In order to steal user information during online transactions, a malicious WordPress plugin known as PhishWP uses a variety of deceptive strategies. 

By mimicking legitimate payment gateways, it harvests card details and 3DS codes through convincing interfaces. Integrated with Telegram, it immediately relays stolen information to attackers. 

It also profiles user environments and sends automated confirmation emails to lull victims into a false sense of security.

Multi-language support and obfuscation options enhance its versatility and stealth, enabling widespread and sophisticated phishing campaigns.

Example of what the attacker views after a successful attack

According to SlashNext, an attacker leverages PhishWP to create a fraudulent e-commerce site offering discounted products, which replicates Stripe payment pages, including 3DS authentication pop-ups. 

When users enter their payment and personal information without realizing it, the plugin secretly sends this sensitive data, including one-time passwords, to the attacker’s Telegram account.

This real-time data stream allows the attacker to quickly initiate unauthorized transactions or sell the stolen information on the dark web, causing significant financial and reputational harm to victims and businesses.

Attackers use PhishWP to compromise WordPress sites by breaching existing ones or creating fraudulent replicas.

These replicas are designed to mimic legitimate payment gateways, such as Stripe, replicating their visual design and language.

Victims are tricked into visiting these deceptive sites through targeted phishing campaigns, leading them to unknowingly enter sensitive financial and personal information into fake checkout pages.

PhishWP captures critical data, such as credit card details and security codes, and immediately transmits it to the attacker via channels like Telegram.

To maintain the illusion of a successful transaction, victims receive fraudulent confirmation emails, while the attackers exploit or monetize the stolen data within illicit online marketplaces.

ANY.RUN Threat Intelligence Lookup - Extract Millions of IOC's for Interactive Malware Analysis: Try for Free

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting both…

1 hour ago

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service that…

2 hours ago

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted the…

5 hours ago

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR Software…

5 hours ago

DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware

The increasing popularity of generative artificial intelligence (GenAI) tools, such as OpenAI’s ChatGPT and Google’s…

5 hours ago

New Context Compliance Exploit Jailbreaks Major AI Models

Microsoft researchers have uncovered a surprisingly straightforward method that can bypass safety guardrails in most…

5 hours ago