Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
PoC Exploit Released for 20-Year Old PostgreSQL Vulnerability
May 20, 2026
ShinyHunters Cyber-Attack Hits Online Learning System
May 20, 2026
GitHub Source Code Breach – TeamPCP Claims Access to Internal
May 20, 2026
Home/Threats/Fake WordPress Renewal Email Steals Admin Credit Card Data
Threats

Fake WordPress Renewal Email Steals Admin Credit Card Data

A deceptive phishing campaign is actively targeting WordPress administrators with convincing Fake WordPress Renewal notices designed to steal credit card information and two-factor authentication...

Jennifer sherman
Jennifer sherman
January 6, 2026 3 Min Read
49 0

A deceptive phishing campaign is actively targeting WordPress administrators with convincing Fake WordPress Renewal notices designed to steal credit card information and two-factor authentication codes.

The emails, masquerading as legitimate WordPress Renewal Email bearing the subject line “Renewal due soon – Action required.”

The message uses urgency-based tactics to pressure recipients into immediate action, warning of potential service disruption without specifying the actual domain name. This generic approach allows the campaign to cast a wide net across multiple organizations.

The email maintains a polished, professional appearance designed to bypass spam filters and appear credible to recipients who may not scrutinize the sender details closely enough.

Fake email (Source - Malwr-Analysis)
Fake email (Source – Malwr-Analysis)

An independent security analyst, Anurag Gawande, identified the malware campaign after analyzing the phishing infrastructure. Upon investigation, Gawande discovered a sophisticated multi-stage attack designed to extract maximum value from each compromised account.

Victims clicking the email link are directed to a fake WordPress checkout page hosted on attacker infrastructure at soyfix[.]com/log/log/.

Infection mechanisms

The page displays a convincing replica of the legitimate WordPress payment interface, complete with accurate pricing breakdowns, VAT calculations, and branded payment method logos.

Phishing Landing Page (Source - Malwr-Analysis)
Phishing Landing Page (Source – Malwr-Analysis)

The phishing portal collects cardholder information through a JavaScript form that captures the cardholder name, card number, expiry date, and CVV.

Upon submission, this sensitive data is sent via POST request to a backend script named send_payment.php, which immediately forwards the stolen credentials to attacker-controlled Telegram bots.

The deception deepens through a second stage targeting two-factor authentication. After card submission, victims encounter a fake 3D Secure verification modal displaying merchant details, transaction references, and amounts.

Users are prompted to enter SMS OTPs. However, the verification process deliberately returns a “Verification failed” message regardless of whether the OTP is correct.

Fake 3-D Secure Verification & OTP Theft (Source - Malwr-Analysis)
Fake 3-D Secure Verification & OTP Theft (Source – Malwr-Analysis)

This forces victims to retry multiple times, allowing attackers to harvest numerous valid OTP codes sent to the victim’s mobile device. These codes are immediately relayed to Telegram channels through a separate send_sms.php endpoint.

The campaign employs psychological trust mechanisms including artificial loading delays—a seven-second pause after payment submission and four-second verification processing delays—to convince victims they are engaging with legitimate banking infrastructure.

These deliberate delays reduce user suspicion and increase the likelihood of compliance.

The attackers cleverly avoid traditional command-and-control infrastructure by leveraging Telegram as their primary exfiltration channel. This approach offers several advantages: minimal infrastructure costs, built-in encryption, difficulty in disruption, and reduced detectability compared to conventional hosted panels.

Email header analysis reveals the campaign originates from theyounginevitables[.]com relayed through Alibaba Cloud SMTP infrastructure, with a weak DMARC policy offering no protection against spoofing.

Organizations should educate administrators to never click domain renewal links in emails and instead verify all renewal notices directly through official WordPress dashboards.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurity

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

CloudEyE MaaS Downloader and Cryptor Infects 100,000+ Users Worldwide

Next Post

Critical n8n Vulnerability Lets Attackers Execute Allow Arbitrary

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Gentlemen Ransomware Hits Windows, Linux, NAS, Attacks ESXi
May 19, 2026
Kimsuky Hackers Use LNK and JSE Lures to Target Recruiters, Crypto
May 19, 2026
Elite SOCs Operationalize Threat Intelligence: 3 Tactics
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us