

SOC Compliance and Auditing: Ensuring Regulatory Adherence
January 13, 2025
RedLine Stealer – Active IOCs
January 13, 2025
SOC Compliance and Auditing: Ensuring Regulatory Adherence
January 13, 2025
RedLine Stealer – Active IOCs
January 13, 2025Severity
High
Analysis Summary
Cybersecurity researchers have uncovered a sophisticated credit card skimmer campaign targeting WordPress e-commerce checkout pages by injecting malicious JavaScript into the CMS’s database table (wp_options).
According to the researcher, malware leverages the "widget_block" option to embed harmful code through the WordPress admin panel enabling it to evade detection. It activates exclusively on checkout pages either by manipulating existing payment fields or generating fake ones to steal sensitive payment details such as credit card numbers, CVV, and billing information.
The malicious JavaScript identifies checkout pages and dynamically generates counterfeit payment screens mimicking trusted processors like Stripe. It can also intercept user data entered into legitimate payment forms.
Captured data is encrypted using Base64 and AES-CBC to avoid analysis before being transmitted to attacker-controlled servers like "valhafather[.]xyz" and "fqbe23[.]xyz." A similar campaign highlighted by a researcher involved a three-layer obfuscation technique with stolen data encoded as JSON, XOR-encrypted, and Base64-encoded before exfiltration to domains such as "staticfonts[.]com."
This threat is part of a broader wave of financially motivated cyberattacks. Another recent campaign involved phishing emails disguised as PayPal payment requests. Exploiting legitimate PayPal URLs and originating from authentic addresses, attackers manipulated Microsoft 365 test domains to bypass security measures. Victims inadvertently linked their PayPal accounts to the attacker’s email, granting unauthorized access.
Additionally, threat actors have adopted a novel "transaction simulation spoofing" technique to exploit Web3 wallets.
By exploiting the time delay between transaction simulation and execution, attackers set up fake decentralized app (DApp) sites to drain victim wallets. This method, which capitalizes on user trust in wallet features, represents an advanced and hard-to-detect phishing evolution, posing a severe challenge to cybersecurity defenses.
Impact
- Sensitive Data Theft
- Unauthorized Access
- Code Executions
Indicators of Compromise
Domain Name
valhafather.xyz
fqbe23.xyz
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Ensure your WordPress installation, plugins, and themes are always updated to the latest versions to mitigate known vulnerabilities.
- Restrict database access to authorized users only and use strong, unique passwords for database accounts.
- Deploy a WAF to block malicious traffic and filter out potentially harmful requests, including JavaScript injections.
- Regularly inspect key database tables like wp_options for unauthorized or suspicious entries, such as "widget_block."
- Configure CSP to limit the sources from which JavaScript can be executed, reducing the risk of malicious script injections.
- Enforce strong passwords, enable two-factor authentication (2FA), and restrict admin access by IP or via a VPN.
- Use tools like Sucuri, Wordfence, or other security scanners to identify malware or vulnerabilities in your website.
- Ensure that payment data is encrypted both in transit and at rest to reduce the risk of data compromise.
- Remove or disable unused plugins, widgets, and features to minimize the attack surface.
- Set up alerts for unusual or unauthorized outbound connections to detect potential data exfiltration.
- Inform customers about the risks of phishing and encourage them to verify the legitimacy of payment forms before entering sensitive details.
- Maintain regular, secure backups of your website to facilitate quick restoration in the event of an attack.
- Consider hiring a security expert or service provider to conduct periodic audits and ensure your site remains secure.