wordpress credit card skimmer

Credit Card Skimmer Masquerading as Facebook Pixel on WordPress & WooCommerce Websites

Overview

A malicious JavaScript block masquerading as a Facebook Pixel was found on a WordPress website that’s using WooCommerce to sell and accept credit card payments from customers. This code secretly loads a malicious JavaScript from feouertit[.]sbs, which in turn loads another script from koeroi[.]online. The final payload injects a fake credit card form, stealing payment details of unsuspecting users.

This article will decode, analyze, and track the infection. We’ll explain what the malware does, its category, removal steps, and how to protect against such attacks.

The Malicious Code

fake credit card form

Step 1: Decoding the Code

What is this code doing?

  • Pretends to be a Facebook Pixel!
  • Obfuscated: Uses variable name mangling and string tricks to hide its real intent.
  • Fetches & Executes a Remote Script: The code decodes a base64-encoded URL and fetches remote JavaScript to run in the browser.

Decoding the URL

The array:

['aHR0cHM6', 'Ly9mZW', '91ZXJ0', 'aXQuc2Jz']

When joined, forms: "aHR0cHM6Ly9mZW91ZXJ0aXQuc2Jz"

Decoded from base64: hxxps://feouertit[.]sbs

So, the script fetches code from hxxps://feouertit[.]sbs

Step 2: What Happens Next?

  1. Malware Fetch:
    The code dynamically fetches another JavaScript from hxxps://feouertit[.]sbs

  2. Further Infection:
    The script from feouertit[.]sbsloads another malicious JavaScript fromkoeroi[.]online.

  3. Payload Delivery:
    The koeroi[.]online script injects a fake credit card/payment form. When users enter payment data, it is stolen and sent to the attacker.

credit card javascript skimmer
credit card javascript skimmer

The above malicious JavaScript is injecting and showing the following fake credit card form on the compromised website:

Fake Credit Card Form
Fake Credit Card Form

Step 3: Threat Analysis

Nature & Category

  • Type: JavaScript Injection / Magecart-style Skimmer
  • Category: Info-Stealer, Skimming Malware, Web Skimmer
  • Vector: Compromised WordPress, theme, plugin, or admin account

What Is It Doing?

  • Steals Credit Card Data: Injects a fake payment form.
  • Bypasses Detection: Hides behind obfuscated code and loads remote scripts dynamically.
  • Pretends to Be Legitimate: Disguises as Facebook Pixel to avoid suspicion.

Step 4: How Did This Get On the Site?

  • Compromised Admin Account: Weak WordPress passwords, reused credentials, or credential stuffing.
  • Vulnerable Plugins or Themes: Outdated or poorly coded plugins/themes with security flaws.
  • Insecure Hosting: Poorly configured or outdated server software.
  • Malware on Developer’s Computer: Stolen credentials via local malware.

Step 5: How to Remove this Malware from my WordPress website?

Immediate Steps

  1. Backup Site and Database (for forensics and rollback, Just in case).
  2. Search for the Malicious Script:
    • Look in all theme files (especially header.php, footer.php, and functions.php)
    • Check plugin files and the WordPress database (wp_posts, wp_options)
  3. Remove All Malicious Code:
    • Remove the entire <script> block shown above and any others referencing feouertit[.]sbs or koeroi[.]online.
  4. Update Everything:
    • Update WordPress core, all plugins, and themes to the latest versions.
  5. Change All Passwords:
    • Admin, FTP, database, hosting, email, and any third-party integrations.
  6. Scan for Backdoors:
    • Look for suspicious PHP files (eval, base64_decode, etc.)
  7. Clean Up Users:
    • Remove any unknown or suspicious admin accounts.

Best Practice: Use a Professional Security Solution

Manual cleanup is risky and time-consuming especially if you don’t know how to clean it properly to avoid getting re-infected. Employ a reputable security platform, Try MoeSec.com

Step 6: How to Protect Against Future Infections

MoeSec Website Security Platform

MoeSec.com offers comprehensive website security, including:

  • 24/7 Malware Scanning & Removal: Automated and manual scans detect even obfuscated malware.
  • Real-Time Threat Detection: Blocks malicious requests and injections before they reach your site.
  • Website Firewall (WAF): Stops attackers, bots, and zero-day exploits.
  • Vulnerability Patching: Instantly patches known plugin/theme flaws.
  • Integrity Monitoring: Alerts you to file changes, suspicious admin accounts, and configuration tampering.
  • Automatic Backups & Restore: Quickly restore a clean version if compromised.
  • Security Hardening: Enforces best practices (2FA, secure passwords, least privilege, etc.).
  • Incident Response: Expert team available for immediate malware removal and forensic investigation.

Conclusion

This threat is a classic example of a Magecart-style web skimmer—highly dangerous, targeting e-commerce and membership sites for payment theft. Masked as a Facebook Pixel, it loads remote malware that can change at any time.

Key Takeaways:

  • Don’t Rely on Manual Detection Alone: Attackers constantly evolve obfuscation techniques.
  • Continuous Monitoring & Protection is Essential: MoeSec.com provide the best defense.
  • Act Fast: The longer the malware is present, the more customers are at risk.

Need Help Now?

Visit MoeSec.com for immediate malware removal, protection, and peace of mind for your website and your customers.


Stay safe, stay secure, and always monitor your site for hidden threats!

Easter Special

Discount
50%

Use Promocode: Easter2025

Offer valid through April 2025 only! Hop on this deal before it disappears!