In a concerning development, unknown cyber attackers are exploiting lesser-known WordPress code snippet plugins to inject malicious PHP code into victim sites, enabling the theft of credit card data from e-commerce platforms.
This new wave of attacks has targeted the Dessky Snippets plugin, a WordPress tool designed for adding custom PHP code, and has significant implications for the security of online transactions.
On May 11, 2024, security researchers at Sucuri discovered this alarming campaign. Despite the Dessky Snippets plugin having only 200 active installations, it became the focal point of the attack due to its vulnerabilities.
The attackers leveraged known flaws in WordPress plugins or used easily guessable credentials to gain administrator access, subsequently installing additional plugins to facilitate their malicious activities. This tactic allowed them to insert server-side PHP skimming malware into compromised sites, specifically targeting the WooCommerce checkout process.
The malicious code, once inserted, alters the billing form to include fields for credit card information, such as names, addresses, card numbers, expiry dates, and CVV numbers. This sensitive data is then exfiltrated to a malicious URL, “hxxps://2of[.]cc/wp-content/.”

The attackers’ method is particularly insidious as they disabled the autocomplete attribute (autocomplete=”off”) on the fake billing form. By preventing the browser from autofilling the fields, the attackers minimize the risk of user suspicion. Users are required to manually enter their credit card information, making the fake fields appear as legitimate parts of the transaction process.
The Dessky Snippets plugin is not the only code snippet tool to have been exploited in this manner. Last month, Sucuri reported the abuse of the WPCode code snippet plugin, which was used to inject malicious JavaScript into WordPress sites, redirecting visitors to VexTrio domains.
Furthermore, during the previous six months, a malware campaign known as Sign1 affected over 39,000 WordPress websites by rerouting users to phony websites with malicious JavaScript injections made possible by the Simple Custom CSS and JS plugin. These instances demonstrate a larger pattern in which malevolent actors target reputable code snippet plugins in an effort to introduce harmful code and take advantage of security holes.
These attacks way too harmful than we can imagine. For e-commerce site owners, the theft of credit card data not only results in financial losses but also damages the trust and reputation of their businesses.
Customers who fall victim to these scams may face severe financial consequences, including unauthorized charges and identity theft. The use of legitimate plugins for malicious purposes complicates the task of securing WordPress sites, as it requires constant vigilance and proactive measures to identify and mitigate potential threats.

WordPress site owners, particularly those running e-commerce functions, must take several steps to protect against such attacks. First and foremost, it is crucial to ensure that all sites and plugins are up-to-date. Cyber attackers often exploit known vulnerabilities in outdated software, so regularly updating plugins and the WordPress core can significantly reduce the risk of compromise.
Additionally, using strong, unique passwords is essential to prevent brute-force attacks. Weak or easily guessable passwords are a common entry point for attackers seeking to gain administrator access.
Regular audits for signs of malware or unauthorized changes are also vital. This includes monitoring the wp_options table in the WordPress database for unusual entries, such as the dnsp_settings option used in the Dessky Snippets attack.
Implementing security plugins that provide real-time protection and malware scanning can help detect and mitigate threats before they cause significant damage. Furthermore, site owners should consider employing a web application firewall (WAF) to block malicious traffic and protect against common attack vectors.
Another critical aspect of securing WordPress sites is educating users about the risks and best practices for online security. This includes training administrators to recognize phishing attempts and other social engineering tactics that attackers may use to gain access to the site.
Encouraging users to use two-factor authentication (2FA) adds an extra layer of security, making it more difficult for attackers to gain access even if they obtain valid credentials.
The recent wave of attacks underscores the importance of a comprehensive security strategy for WordPress sites, particularly those handling sensitive financial data. While no system can be entirely immune to cyber threats, adopting a proactive approach to security can significantly reduce the risk of compromise.
This includes regularly updating software, using strong passwords, conducting frequent security audits, and educating users about best practices.
The cyber attack on the Dessky Snippets plugin is a stark reminder of the evolving tactics used by cyber criminals to exploit vulnerabilities and steal sensitive information.

As technology continues to advance, so too do the methods employed by attackers. Staying informed about the latest threats and security best practices is crucial for maintaining the integrity and security of online transactions.
In conclusion, the exploitation of WordPress plugins to steal credit card data from e-commerce sites highlights the critical need for robust security measures. Site owners must remain vigilant and proactive in their efforts to protect against cyber threats. By regularly updating software, using strong passwords, conducting security audits, and educating users, they can significantly reduce the risk of compromise and safeguard sensitive financial data. The ongoing battle against cyber crime requires a concerted effort from all stakeholders to ensure the security and trustworthiness of online transactions.
Visit out website for the best budget friendly, cybersecurity services.