Security Awareness Expert On New E-skimmer Discovered On WordPress Site Utilizing WooCommerce Plugin

By   ISBuzz Team
Writer , Information Security Buzz | Apr 14, 2020 03:42 am PST

In response to a new report that indicates credit card thieves are targeting WordPress e-commerce sites powered by WooCommerce with a dedicated JavaScript-based card-skimmer malware, a security awareness expert offers perspective.

Notify of
1 Expert Comment
Oldest Most Voted
Inline Feedbacks
View all comments
James McQuiggan
James McQuiggan , Security Awareness Advocate
April 14, 2020 11:44 am

Third-party plugins are always a high-value target for criminals, as it\’s an easy way to access hundreds to thousands of sites through manipulating the code at the source where the plugin is developed. Organizations want to make sure they educate and train their developers to analyze and verify all third-party plugins for unusual activity through the quality and analysis testing process before releasing new updates.

The website is an organization\’s \”front door\” to the world, and if they don\’t keep their home secure, they risk someone breaking into their home and stealing valuables. Like a home, the website must be secured, and one easy way is to verify the plugins and software regularly. Failure to do so can lead to hackers quickly gaining access to the site and stealing data or defacing the site. While the plugin may be well accepted, if it\’s not inspected and verified, the risk of doing so can lead to a data breach and damage to reputation.

Last edited 4 years ago by James McQuiggan

Recent Posts

Would love your thoughts, please comment.x