Credit Card Information Stolen Through WordPress Checkout Attack

A sneaky malware attack has been uncovered targeting WordPress websites. This time, cybercriminals used a very clever trick to steal people’s payment card details. They disguised their malicious operation behind what looked like a normal font-related website. The domain, called italicfonts[.]org, appeared harmless at first glance.

WordPress Websites Under Silent Threat

But in reality, it was designed to capture and steal sensitive payment information during online checkouts.

The case came to light when a WordPress website owner noticed an unusual number of credit card fraud complaints from customers who had recently made purchases. At first, nothing seemed out of place. The checkout page looked and functioned as expected. But behind the scenes, the site had been quietly compromised by a hidden malicious script.

Experts discovered that the attackers had injected this harmful script into a key part of the website’s code — the footer.php file. This file is part of the website’s theme and loads on every page, making it the perfect hiding spot. Once the user reached the checkout page, the script activated and did something alarming. It created a fake credit card form that appeared just like the real one. This fake form collected the card number, expiration date, CVV code, and billing address entered by the customer.

All of this information was sent in real time to a remote server. That server was hosted on italicfonts[.]org — the fake font domain the attackers had set up for this purpose. The process was invisible to the user. The form looked legitimate, the page looked secure, and the transaction appeared to go through. But behind the scenes, the attackers were collecting every single detail.

The Dangerous Trick Behind the Fake Font Domain

The success of this attack relied heavily on how realistic the setup looked. The domain name used by the attackers seemed completely normal. A site offering italic fonts doesn’t raise suspicion, especially to someone just trying to complete a purchase. But there were clues that showed something was wrong.

This domain had no real font content. In fact, it wasn’t indexed by search engines at all, which means people couldn’t find it through a simple search. That’s strange for any genuine website. Search engines usually list sites with useful content, and font resource sites tend to be popular. So the lack of visibility was the first red flag.

Another sign of danger was the domain’s recent registration. Attackers often use brand-new domains to avoid being detected by security tools. Newly registered websites don’t have much of a history online, making them harder for automated systems to judge as suspicious.

Critical Vulnerabilities: The Dark Side of Pacemaker Technology

But the biggest giveaway was how the domain was used. It wasn’t just sitting there. It was connected directly to the fake payment form stealing credit card data. The script that created this form was also heavily obfuscated. This means it was scrambled in a way that made it nearly impossible to understand at a glance. Obfuscation is a tactic often used by hackers to hide the true purpose of their code. This makes it harder for security software — and even human eyes — to detect malicious activity.

How the Scam Was Uncovered

The malware was discovered only after multiple cases of fraud were reported by customers. When experts took a deeper look at the website, they noticed that the footer.php file had recently been changed. That file is a common target for attackers because it loads on every page of a WordPress site. By placing the malicious script there, the attackers ensured that it would run at the right time — during checkout — without affecting the overall look or function of the website.

Once loaded, the fake form blended seamlessly with the real one. Users were unaware they were entering information into a trap. Everything they typed was sent straight to the attackers, allowing them to use or sell the stolen card details.

How Cyber Attacks on Industrial Control Systems Can Endanger Lives ?

Even advanced security tools had difficulty catching this trick because the fake domain looked innocent. It didn’t host malware in the traditional sense. It didn’t contain suspicious downloads or obvious viruses. Instead, it simply served as a tool for stealing information — silently and efficiently.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Koala Habitat Destruction Persists Despite Political Promises in Australia

Since 2011, close to 2 million hectares of forests...

High Tariffs Force Tesla to Pull Model S and Model X from China

Tesla has officially stopped selling its luxury Model S...

Medical Devices Exposed by Hidden Malware ‘ELFDICOM’ in Scans

A Quiet Threat in a Trusted System Hospitals and clinics...

4 Shocking Attacks That Exposed SK Group, Sensata, and the West

SK Group Targeted by Ruthless Cyber Gang Qilin in...

SK Group Targeted by Ruthless Cyber Gang Qilin in 1TB Data Leak Threat

A Giant Company Under Threat SK Group, one of South...

Ransomware Attack Disrupts Sensata Technologies’s Daily Operations

What Happened at Sensata? Sensata Technologies is a major company...

Malaysia Rises as a Clean Energy Leader with Bold Clean Energy Moves

Malaysia’s Big Push for Clean Energy Malaysia is making big...

Russian Espionage Group ‘Shuckworm’ Deploys New Malware to Spy on Western Forces in Ukraine

A Decade of Digital Espionage A Russian-backed hacking group called...

Hackers Spied on U.S. Banking Regulator’s Confidential Emails for Nearly 2 Years

A Major Cyberattack on a Critical U.S. Financial Agency Hackers...

Algeria-linked Hackers Breach Moroccan Government Website

Major Government Website Hacked A major cyberattack has hit Morocco,...

Koala Habitat Destruction Persists Despite Political Promises in Australia

Since 2011, close to 2 million hectares of forests...

High Tariffs Force Tesla to Pull Model S and Model X from China

Tesla has officially stopped selling its luxury Model S...

Medical Devices Exposed by Hidden Malware ‘ELFDICOM’ in Scans

A Quiet Threat in a Trusted System Hospitals and clinics...

4 Shocking Attacks That Exposed SK Group, Sensata, and the West

SK Group Targeted by Ruthless Cyber Gang Qilin in...

SK Group Targeted by Ruthless Cyber Gang Qilin in 1TB Data Leak Threat

A Giant Company Under Threat SK Group, one of South...

Ransomware Attack Disrupts Sensata Technologies’s Daily Operations

What Happened at Sensata? Sensata Technologies is a major company...

Malaysia Rises as a Clean Energy Leader with Bold Clean Energy Moves

Malaysia’s Big Push for Clean Energy Malaysia is making big...

Russian Espionage Group ‘Shuckworm’ Deploys New Malware to Spy on Western Forces in Ukraine

A Decade of Digital Espionage A Russian-backed hacking group called...

Related Articles

Popular Categories

error: Content is protected !!