- Cyber Syrup
- Posts
- Wordpress E-Commerce Sites At Risk
Wordpress E-Commerce Sites At Risk
WordPress websites using plugins for custom code snippets have been compromised and are harvesting credit card data
CYBER SYRUP
Delivering the sweetest insights on cybersecurity.
Wordpress E-Commerce Sites At Risk
Recent reports have highlighted a significant threat to WordPress websites, particularly those using plugins for custom code snippets. Unknown threat actors have been abusing lesser-known code snippet plugins to insert malicious PHP code into victim sites, leading to the harvesting of credit card data. This underlines the critical need for WordPress website owners to keep their plugins and sites updated regularly and avoid using tools they do not fully understand or need.
The Threat: Malicious Code in WordPress Plugins
On May 11, 2024, Sucuri observed a campaign exploiting a WordPress plugin called Dessky Snippets, which allows users to add custom PHP code. With over 200 active installations, this plugin has become a target for cybercriminals. Attackers leverage known flaws in WordPress plugins or guessable credentials to gain administrator access, install other plugins, and exploit them post-infiltration.
Once attackers gain access, they use the Dessky Snippets plugin to insert server-side PHP credit card skimming malware. This malware is designed to steal financial data by modifying the checkout process in WooCommerce, manipulating the billing form to inject additional fields requesting sensitive credit card information. The stolen data is then exfiltrated to a remote URL.
Who Is at Risk?
E-commerce Sites: Websites that handle financial transactions are at high risk as they store and process sensitive customer information, making them prime targets for such attacks.
WordPress Site Owners: Any website using WordPress plugins for custom code snippets can be vulnerable, especially if the plugins are not regularly updated or if weak passwords are used.
Customers: Individuals who use these compromised websites are at risk of having their financial information stolen, leading to potential identity theft and financial loss.
How to Protect Yourself and Your Customers
Regular Updates: Ensure that your WordPress core, themes, and plugins are always up to date. Developers frequently release updates that patch security vulnerabilities and enhance functionality. Regular updates help protect your site from known exploits.
Strong Passwords: Use strong, unique passwords for all accounts associated with your WordPress site. Avoid using easily guessable credentials. Consider using a password manager to generate and store complex passwords.
Limit Plugin Use: Only install plugins that are absolutely necessary for your website’s functionality. Avoid using plugins that you do not fully understand or need. Each additional plugin is a potential entry point for attackers.
Regular Audits: Conduct regular audits of your website to check for any signs of unauthorized changes or malware. This can include scanning for malicious code, unusual activity in server logs, and changes to critical files.
Disable Unused Plugins: If you have plugins that are no longer in use, deactivate and delete them. Unused plugins can still pose a security risk if they are left installed but not updated.
Implement Security Plugins: Use reputable security plugins to add an extra layer of protection to your WordPress site. These plugins can help detect and block malicious activity, scan for vulnerabilities, and enforce strong security practices.
Monitor User Activity: Keep an eye on user activity, especially for accounts with administrative privileges. Monitoring can help you detect suspicious behavior early and take action before significant damage occurs.
Use HTTPS: Ensure your website uses HTTPS to encrypt data transmitted between your site and its users. This helps protect sensitive information from being intercepted during transmission.
The Broader Implications
This campaign is not an isolated incident. Similar attacks have been observed using other code snippet plugins. For instance, the WPCode code snippet plugin was exploited to inject malicious JavaScript, redirecting site visitors to malicious domains. Another malware campaign, Sign1, infected over 39,000 WordPress sites by injecting malicious JavaScript via the Simple Custom CSS and JS plugin, redirecting users to scam sites.
Conclusion
The abuse of WordPress plugins for malicious purposes highlights the importance of vigilance for website owners. Regularly updating plugins and the WordPress core, using strong passwords, limiting plugin use, and conducting regular site audits are essential steps in safeguarding your website and protecting your customers’ data. By adopting these best practices, you can significantly reduce the risk of falling victim to such attacks and ensure a safer online environment for your users.