New WordPress Plugin Vulnerability (Dessky Snippets) Reveals Credit Card Data Theft From E-commerce Sites

dessky snippets wordpress

Recently, Sucuri’s vigilant eye caught wind of a concerning trend: cyber malefactors exploiting a lesser-known WordPress plugin, Dessky Snippets, to orchestrate a nefarious campaign aimed at pilfering sensitive credit card data from unsuspecting e-commerce websites.

This unsettling revelation, unearthed on May 11, 2024, serves as a clarion call for heightened vigilance among online merchants and WordPress aficionados alike. With over 200 active installations, Dessky Snippets initially seemed innocuous, offering users the convenience of incorporating custom PHP code snippets into their WordPress sites. Little did they know, this seemingly innocuous plugin had been commandeered by malicious actors with ill intent.

Ben Martin, a vigilant cybersecurity researcher, shed light on the modus operandi behind this insidious assault. Through surreptitious manipulation of the dnsp_settings option within the WordPress wp_options table, the perpetrators clandestinely implanted a pernicious PHP credit card skimming malware, poised to intercept and exfiltrate sensitive financial information.

The implications of this breach are profound, as the injected malware stealthily manipulates the checkout process within WooCommerce, a popular e-commerce plugin for WordPress. By surreptitiously augmenting the billing form with fraudulent fields masquerading as legitimate data inputs, the cybercriminals cunningly coerce unsuspecting shoppers into divulging their credit card details, including names, addresses, card numbers, expiry dates, and CVV numbers.

What sets this devious stratagem apart is its astute evasion of browser safeguards. Through meticulous tinkering, the malefactors disabled the autocomplete attribute on the counterfeit billing form, preempting browser warnings and obfuscating the malicious nature of their ruse. This calculated move ensures that the fields remain conspicuously blank, allaying suspicion and duping users into perceiving them as routine transactional requisites.

update now

Regrettably, this reprehensible exploit isn’t an isolated incident. Merely a month prior, Sucuri unearthed a similar malfeasance wherein the WPCode code snippet plugin was weaponized to inject pernicious JavaScript code into WordPress sites, redirecting hapless visitors to nefarious domains operated by VexTrio.

Moreover, the specter of cyber peril looms large with the emergence of the Sign1 malware campaign, which has ensnared over 39,000 WordPress sites over the past six months. Leveraging malicious JavaScript injections via the Simple Custom CSS and JS plugin, this insidious malware redirects unwitting users to fraudulent websites, perpetuating a cycle of deception and exploitation.

In light of these sobering revelations, proactive measures are imperative to fortify the cyber defenses of WordPress site owners, especially those entrusted with the custodianship of e-commerce platforms. Timely updates for WordPress core and plugins, coupled with the adoption of robust password protocols, serve as bulwarks against brute-force assaults and unauthorized incursions.

Furthermore, a regimen of regular site audits is indispensable in detecting and neutralizing malware incursions before they metastasize into full-blown crises. By remaining vigilant and proactive in the face of evolving cyber threats, online merchants can safeguard the sanctity of their digital domains and uphold the trust of their discerning clientele. After all, in the ever-shifting landscape of cyberspace, eternal vigilance is the price of digital sovereignty.

1 thought on “New WordPress Plugin Vulnerability (Dessky Snippets) Reveals Credit Card Data Theft From E-commerce Sites”

  1. Pingback: Microsoft Unveils 'Moonstone Sleet': A New Hacker Group of North Korea

Comments are closed.

Scroll to Top