Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Russian hackers turn trusted online stores into phishing pages
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

In a smart campaign, Russian cybercriminals are turning trusted online stores into phishing pages that capture sensitive details through convincing payment interfaces.According to a research by the cybersecurity firm Slashnext, the Russian miscreants have built a WordPress plugin, PhishWP, which creates fake payment pages that look like trusted services, such as Stripe.”WordPress is one of the most popular web application publishing platforms that is easy to customize via plugins,” said Mayuresh Dani, manager of security research at Qualys Threat Research Unit. “Consumers and administrators alike are familiar with the WordPress interface, which makes plugins such as PhishWP a higher risk.”According to SlashNext, information at risk includes credit card number, expiration date, CVV, billing address, and browser metadata. PhishWP integrates with Telegram, instantly transmitting stolen data to attackers once a victim presses “enter,” SlashNext noted in a blog post, accelerating and enhancing the efficiency of phishing attacks.”As soon as a user enters their payment details, the plugin transmits that information directly to the attacker, via instant messaging platforms like Telegram,” said Jason Soroko, senior fellow at Sectigo. “This immediate forwarding of information equips cybercriminals with the necessary credentials to make fraudulent purchases or resell the stolen data”, sometimes within minutes of capturing it.”Attackers can either hack legitimate WordPress websites or create fake ones to install the plugin. Once set up to look like a payment gateway, it tricks users into entering their payment information.The plugin was reportedly found to be distributed on a Russian cybercrime forum.

Advanced OTP theft

The research also revealed an added potential for the plugin to be used for more advanced theft leading to fake transactions.According to SlashNext findings, PhishWP employs advanced tactics, such as stealing the OTP sent during a 3D Secure (3DS) check. By capturing this code, attackers can impersonate users, making their fraudulent transactions appear legitimate.”With the OTP in hand, cybercriminals bypass one of the most critical safeguards in digital transactions, making their fraudulent activities look alarmingly legitimate to both banks and unwitting shoppers,” Soroko said.  “Many people have been trained to believe that one-time passcodes (OTP) help a system to be more secure, but in this case, they are merely handing over the keys to their adversary.”Other key features offered with the plugin include customizable checkout pages, auto-response emails, multi-language support, and obfuscation options.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3632753/russian-hackers-turn-trusted-online-stores-into-phishing-pages.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link