Author Topic: JS:CardStealer-CN [Trj]  (Read 7815 times)

0 Members and 1 Guest are viewing this topic.

Offline megumi.kuma.chan

  • Newbie
  • *
  • Posts: 2
JS:CardStealer-CN [Trj]
« on: December 02, 2020, 11:07:04 PM »
I recently was trying to access a website and recieved this error:

JS:CardStealer-CN [Trj]

I have the free version of Avast running on my laptop [ASUS dino from 2012]

Was wondering if this is a problem with my computer or browser, or if it was the website?
(wxw.wishtrend.com)

Obviously worrisome since the threat detected says card stealer.
I am not great with tech or really know what this message is indicating, so was hoping someone could help.
« Last Edit: December 04, 2020, 02:36:29 PM by Milos »

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37534
  • Not a avast user
Re: JS:CardStealer-CN [Trj]
« Reply #1 on: December 02, 2020, 11:19:45 PM »
Quote
Was wondering if this is a problem with my computer or browser, or if it was the website?
That depends what the message from avast say, all info on that message but (JS:CardStealer) java scripts is usually related to a website

screenshots say more than thousand words




« Last Edit: December 02, 2020, 11:22:56 PM by Pondus »

Offline megumi.kuma.chan

  • Newbie
  • *
  • Posts: 2
Re: JS:CardStealer-CN [Trj]
« Reply #2 on: December 03, 2020, 06:42:04 AM »
I got help to provide a screenshot, as I wasn't sure how to before.
[& it's been awhile since myspace ::)]

Hopefully, this would help in knowing how to move forward.



***

I also ran a scan since I last posted, and it informed me of NO MALWARE on my system. (using free avast)

So I'm guessing it was something on the sites end. (?)

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33904
  • malware fighter
Re: JS:CardStealer-CN [Trj]
« Reply #3 on: December 03, 2020, 12:24:01 PM »
That site you have visited has outdated software and therefore a risk to visit,
as it can be easily compromised.
See: https://sitecheck.sucuri.net/results/www.wishtrend.com
Nothing given here: https://www.virustotal.com/gui/ip-address/18.144.59.222/relations
When something it is Amazon-02 abuse.

Outdated Word Press version: WordPress Version 5.1.1
Could have been hacked through: Plugin   Update Status   About
woocommerce 3.6.5   Warning   latest release (4.7.1)
https://woocommerce.com/

Directory Indexing
In the test an attempt was made to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is a common information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.

Path Tested   Status
/wp-content/uploads/      enabled
/wp-content/plugins/      disabled
Directory indexing is tested on the /wp-content/uploads/ and /wp-content/plugins/ directores. Note that other directories may have this web server feature enabled, so ensure you check other folders in your installation. It is good practice to ensure directory indexing is disabled for your full WordPress installation either through the web server configuration or .htaccess.

Link found to -https://www.pinterest.co.kr/  blocked links to -(s)pinimig.com

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Milos

  • Avast team
  • Super Poster
  • *
  • Posts: 2294
Re: JS:CardStealer-CN [Trj]
« Reply #4 on: December 04, 2020, 02:41:30 PM »
Hello,
the page is infected with card skimmer. The script from the attached image loads malicious JS.

Milos

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37534
  • Not a avast user