Introduction
PhishWP is a malicious WordPress plugin that poses a significant threat to online security by enabling cybercriminals to create fraudulent payment pages. These pages closely mimic legitimate services [3], such as Stripe [2], to deceive users into providing sensitive financial and personal information. This tool has been primarily discovered on Russian cybercrime forums and is used to exploit vulnerabilities in WordPress sites.
Description
PhishWP is a malicious WordPress plugin exploited by cybercriminals to create fraudulent payment pages that closely mimic legitimate services like Stripe [3] [5] [9]. Primarily discovered on Russian cybercrime forums [3] [11] [12], this tool allows attackers to design convincing payment interfaces aimed at stealing sensitive financial and personal data [3], including credit card information [2] [3] [4] [5] [6] [7] [8] [12] [13], billing addresses [1] [3] [9] [11] [12], and one-time passwords (OTPs) [1] [3] [4] [5] [6] [7] [9] [11] [12] [13]. By exploiting vulnerabilities, PhishWP can either compromise existing legitimate WordPress sites or set up entirely fraudulent ones, transforming them into phishing traps that mislead victims into believing they are engaging in secure transactions.
A key feature of PhishWP is its ability to intercept the 3D Secure (3DS) verification process, which involves sending OTPs to users. By tricking victims into entering their OTPs on counterfeit checkout pages [11], attackers can impersonate cardholders and execute unauthorized transactions [6]. The plugin enhances traditional phishing techniques by directing users to deceptively realistic checkout pages, where they are prompted to enter their payment information and OTPs [5]. The immediate transmission of stolen data is facilitated through integration with Telegram, allowing cybercriminals to receive the information in real time, often within minutes of capture [1].
In addition to its phishing capabilities, PhishWP can be utilized for SEO poisoning attacks, promoting WordPress sites with fake product listings to lure in unsuspecting victims. The rapid forwarding of stolen information enables cybercriminals to make fraudulent purchases or resell the data shortly after capture [8]. Furthermore, PhishWP collects browser profiling data [13], such as IP addresses and user agents [13], which assists attackers in replicating user environments for future fraud attempts and evading detection [13]. The plugin supports multiple languages and includes customizable checkout pages, auto-response emails [5] [10] [12], and obfuscation options to conceal its true purpose [9]. To further obscure their activities [13], attackers may send misleading confirmation emails to victims after their information is stolen [13], creating the illusion of successful transactions and providing them with more time to exploit the data [13].
Experts emphasize the significant threat posed by plugins like PhishWP, which can effectively mimic payment interfaces to harvest user information [5]. There is a pressing need for enhanced phishing protection to combat threats like PhishWP [13], and WordPress users should remain vigilant against potential compromises and suspicious plugins [13]. Implementing reliable security measures [5], such as advanced browser-based phishing protection tools that provide real-time threat detection [3], is crucial to defend against malicious URLs and compromised websites, ensuring fast threat detection and blocking capabilities [6].
Conclusion
PhishWP represents a sophisticated threat to online security, leveraging advanced techniques to deceive users and steal sensitive information. The plugin’s ability to mimic legitimate payment interfaces and intercept security processes underscores the need for robust security measures. To mitigate the risks posed by such threats, it is essential for users and website administrators to implement advanced phishing protection tools and remain vigilant against suspicious activities. As cybercriminals continue to evolve their tactics, ongoing efforts to enhance security protocols and user awareness will be crucial in safeguarding against future threats.
References
[1] https://www.darkreading.com/threat-intelligence/phishwp-plugin-hijacks-wordpress-e-commerce-checkouts
[2] https://gbhackers.com/wordpress-plugin-payment-data-theft/
[3] https://cybermaterial.com/phishwp-plugin-steals-data-from-users/
[4] https://securityboulevard.com/2025/01/meet-phishwp-the-new-wordpress-plugin-thats-turning-legit-sites-into-phishing-traps/
[5] https://hackread.com/phishwp-plugin-russian-hacker-forum-phishing-sites/
[6] https://slashnext.com/blog/phishwp-turns-sites-into-phishing-traps/
[7] https://securityonline.info/beware-of-phishwp-new-wordpress-plugin-targets-online-shoppers/
[8] https://www.channele2e.com/brief/phishwp-wordpress-plugin-impersonating-stripe-spreads-across-russian-cybercrime-forums
[9] https://www.infosecurity-magazine.com/news/phishwp-plugin-enables-payment/
[10] https://thenimblenerd.com/article/phishwp-the-russian-scam-turning-wordpress-into-a-cybercrime-circus/
[11] https://securityboulevard.com/2025/01/wordpress-plugin-exploited-to-turn-legitimate-sites-into-phishing-traps/
[12] https://www.csoonline.com/article/3632753/russian-hackers-turn-trusted-online-stores-into-phishing-pages.html
[13] https://siliconangle.com/2025/01/06/new-phishwp-plugin-harvests-credit-card-data-otps-legitimate-sites/




