Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WebRTC Skimmer Evades CSP to Steal E-Commerce Data

WebRTC Skimmer Evades CSP to Steal E-Commerce Data

Posted on March 26, 2026 By CWS

Cybersecurity experts have uncovered a sophisticated skimmer that leverages WebRTC data channels to infiltrate and extract payment information from e-commerce websites. This new tactic enables the malware to circumvent traditional security barriers.

Innovative Skimmer Exploits WebRTC

Sansec, a renowned security firm, reported that this skimmer diverges from typical HTTP-based methods by utilizing WebRTC data channels. This technique allows the malware to load its harmful payload and transmit stolen data without being detected by standard security measures.

The skimmer specifically targeted a car manufacturer’s online store, exploiting a vulnerability known as PolyShell. This flaw affects platforms like Magento Open Source and Adobe Commerce, allowing unauthorized users to execute code by uploading arbitrary files through the REST API.

Widespread Vulnerability Exploitation

Since March 19, 2026, the PolyShell vulnerability has been extensively exploited, with over 50 IP addresses identified in related scanning activities. Sansec noted that approximately 56.7% of susceptible e-commerce sites have been compromised by these attacks.

The skimmer operates by establishing a WebRTC peer connection to a specific IP address (“202.181.177[.]177”) over UDP port 3479. It then injects JavaScript into the webpage to capture payment data, highlighting a major evolution in skimming techniques.

Challenges in Detecting WebRTC Skimmers

The use of WebRTC presents significant challenges for conventional content security policies (CSP). Even stringent CSP settings that block unauthorized HTTP traffic are vulnerable to WebRTC-based data theft. The data channels run over DTLS-encrypted UDP, making it difficult for network security tools focused on HTTP traffic to detect this activity.

Adobe addressed the PolyShell vulnerability with a patch in version 2.4.9-beta1, released on March 10, 2026. However, this fix has not yet been implemented in production environments, leaving many sites exposed.

Recommended Security Measures

To mitigate these risks, site administrators are advised to block access to the “pub/media/custom_options/” directory and conduct thorough scans for web shells, backdoors, and other malicious software. Such proactive measures are crucial in safeguarding e-commerce platforms from these advanced skimmer attacks.

In conclusion, the emergence of WebRTC-based skimmers underscores the need for continuous advancements in cybersecurity practices. As attackers become more sophisticated, so too must the strategies employed to defend against them.

The Hacker News Tags:Adobe Commerce, CSP bypass, Cybersecurity, e-commerce security, Magento vulnerability, Malware, payment skimmer, PolyShell, web security, WebRTC

Post navigation

Previous Post: New npm Attack Targets Developers with Hidden Malware
Next Post: Dell and HP Enhance Quantum-Resistant Security Solutions

Related Posts

How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year? How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year? The Hacker News
Unveiling Cyber Deception: Lessons from Art Forgery Unveiling Cyber Deception: Lessons from Art Forgery The Hacker News
INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure The Hacker News
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware The Hacker News
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims The Hacker News
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit JPEG Files to Spread Malware
  • Skoda Online Shop Faces Significant Data Breach
  • Enhancing Security: The Rise of Autonomous Purple Teaming
  • GhostLock Exploits File-Sharing to Mimic Ransomware
  • Cloudflare’s Strategic Layoffs Amidst AI Expansion

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit JPEG Files to Spread Malware
  • Skoda Online Shop Faces Significant Data Breach
  • Enhancing Security: The Rise of Autonomous Purple Teaming
  • GhostLock Exploits File-Sharing to Mimic Ransomware
  • Cloudflare’s Strategic Layoffs Amidst AI Expansion

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark