Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WebRTC Skimmer Evades CSP to Steal E-Commerce Data

WebRTC Skimmer Evades CSP to Steal E-Commerce Data

Posted on March 26, 2026 By CWS

Cybersecurity experts have uncovered a sophisticated skimmer that leverages WebRTC data channels to infiltrate and extract payment information from e-commerce websites. This new tactic enables the malware to circumvent traditional security barriers.

Innovative Skimmer Exploits WebRTC

Sansec, a renowned security firm, reported that this skimmer diverges from typical HTTP-based methods by utilizing WebRTC data channels. This technique allows the malware to load its harmful payload and transmit stolen data without being detected by standard security measures.

The skimmer specifically targeted a car manufacturer’s online store, exploiting a vulnerability known as PolyShell. This flaw affects platforms like Magento Open Source and Adobe Commerce, allowing unauthorized users to execute code by uploading arbitrary files through the REST API.

Widespread Vulnerability Exploitation

Since March 19, 2026, the PolyShell vulnerability has been extensively exploited, with over 50 IP addresses identified in related scanning activities. Sansec noted that approximately 56.7% of susceptible e-commerce sites have been compromised by these attacks.

The skimmer operates by establishing a WebRTC peer connection to a specific IP address (“202.181.177[.]177”) over UDP port 3479. It then injects JavaScript into the webpage to capture payment data, highlighting a major evolution in skimming techniques.

Challenges in Detecting WebRTC Skimmers

The use of WebRTC presents significant challenges for conventional content security policies (CSP). Even stringent CSP settings that block unauthorized HTTP traffic are vulnerable to WebRTC-based data theft. The data channels run over DTLS-encrypted UDP, making it difficult for network security tools focused on HTTP traffic to detect this activity.

Adobe addressed the PolyShell vulnerability with a patch in version 2.4.9-beta1, released on March 10, 2026. However, this fix has not yet been implemented in production environments, leaving many sites exposed.

Recommended Security Measures

To mitigate these risks, site administrators are advised to block access to the “pub/media/custom_options/” directory and conduct thorough scans for web shells, backdoors, and other malicious software. Such proactive measures are crucial in safeguarding e-commerce platforms from these advanced skimmer attacks.

In conclusion, the emergence of WebRTC-based skimmers underscores the need for continuous advancements in cybersecurity practices. As attackers become more sophisticated, so too must the strategies employed to defend against them.

The Hacker News Tags:Adobe Commerce, CSP bypass, Cybersecurity, e-commerce security, Magento vulnerability, Malware, payment skimmer, PolyShell, web security, WebRTC

Post navigation

Previous Post: New npm Attack Targets Developers with Hidden Malware
Next Post: Dell and HP Enhance Quantum-Resistant Security Solutions

Related Posts

Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories The Hacker News
Key Capabilities Security Leaders Need to Know Key Capabilities Security Leaders Need to Know The Hacker News
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts The Hacker News
LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds The Hacker News
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks The Hacker News
Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Cyber Threats Breach Global Telecom Systems
  • Validate Security Measures Against Real Threats
  • Critical Cisco Firewall Flaw Enables Remote Code Execution
  • Coruna iOS Kit Revives 2023 Exploits in New Attacks
  • Critical Flaw in Synology DSM Risks Remote Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Cyber Threats Breach Global Telecom Systems
  • Validate Security Measures Against Real Threats
  • Critical Cisco Firewall Flaw Enables Remote Code Execution
  • Coruna iOS Kit Revives 2023 Exploits in New Attacks
  • Critical Flaw in Synology DSM Risks Remote Exploitation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark