Phishing

New WordPress Plugin That Weaponizes Legit Sites To Steal Customer Payment Data

Cybercriminals have developed PhishWP, a malicious WordPress plugin, to facilitate sophisticated phishing attacks, which enable attackers to create convincing replicas of legitimate payment gateways, such as Stripe, on compromised or fraudulent WordPress websites. 

By seamlessly integrating with Telegram, PhishWP facilitates real-time data exfiltration, including credit card details, personal information, and even 3DS authentication codes. 

This allows attackers to bypass security measures and execute fraudulent transactions with increased efficiency, posing a significant threat to online users and businesses alike.

Official advertisement for PhishWP

In order to steal user information during online transactions, a malicious WordPress plugin known as PhishWP uses a variety of deceptive strategies. 

By mimicking legitimate payment gateways, it harvests card details and 3DS codes through convincing interfaces. Integrated with Telegram, it immediately relays stolen information to attackers. 

It also profiles user environments and sends automated confirmation emails to lull victims into a false sense of security.

Multi-language support and obfuscation options enhance its versatility and stealth, enabling widespread and sophisticated phishing campaigns.

Example of what the attacker views after a successful attack

According to SlashNext, an attacker leverages PhishWP to create a fraudulent e-commerce site offering discounted products, which replicates Stripe payment pages, including 3DS authentication pop-ups. 

When users enter their payment and personal information without realizing it, the plugin secretly sends this sensitive data, including one-time passwords, to the attacker’s Telegram account.

This real-time data stream allows the attacker to quickly initiate unauthorized transactions or sell the stolen information on the dark web, causing significant financial and reputational harm to victims and businesses.

Attackers use PhishWP to compromise WordPress sites by breaching existing ones or creating fraudulent replicas.

These replicas are designed to mimic legitimate payment gateways, such as Stripe, replicating their visual design and language.

Victims are tricked into visiting these deceptive sites through targeted phishing campaigns, leading them to unknowingly enter sensitive financial and personal information into fake checkout pages.

PhishWP captures critical data, such as credit card details and security codes, and immediately transmits it to the attacker via channels like Telegram.

To maintain the illusion of a successful transaction, victims receive fraudulent confirmation emails, while the attackers exploit or monetize the stolen data within illicit online marketplaces.

ANY.RUN Threat Intelligence Lookup - Extract Millions of IOC's for Interactive Malware Analysis: Try for Free

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication bypass…

7 hours ago

Microsoft Patch Tuesday February 2025: 61 Vulnerabilities Including 25 RCE & 3 0-Day

Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing a…

8 hours ago

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the risks…

10 hours ago

Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks

The realm of fault injection attacks has long intrigued researchers and security professionals. Among these,…

10 hours ago

Satellite Weather Software Vulnerabilities Let Attackers Execute Code Remotely

IBL Software Engineering has disclosed a significant security vulnerability, identified as CVE-2025-1077, affecting its Visual…

10 hours ago

OpenAI Developing Its Own Chip to Reduce Reliance on Nvidia

OpenAI, the organization behind ChatGPT and other advanced AI tools, is making significant strides in…

15 hours ago