New credit card skimmer malware targets WordPress e-commerce checkout pages by injecting malicious JavaScript into database tables, making it hard to detect. The malware activates on checkout pages, creating fake forms or hijacking existing ones to steal payment information. The stolen data is then encoded and sent to an attacker-controlled server. Recent discoveries also highlight phishing email campaigns targeting PayPal users and a novel technique called transaction simulation spoofing used to steal cryptocurrency.

4m read timeFrom thehackernews.com
Post cover image

Sort: