Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WebRTC Skimmer Evades CSP to Steal E-Commerce Data

WebRTC Skimmer Evades CSP to Steal E-Commerce Data

Posted on March 26, 2026 By CWS

Cybersecurity experts have uncovered a sophisticated skimmer that leverages WebRTC data channels to infiltrate and extract payment information from e-commerce websites. This new tactic enables the malware to circumvent traditional security barriers.

Innovative Skimmer Exploits WebRTC

Sansec, a renowned security firm, reported that this skimmer diverges from typical HTTP-based methods by utilizing WebRTC data channels. This technique allows the malware to load its harmful payload and transmit stolen data without being detected by standard security measures.

The skimmer specifically targeted a car manufacturer’s online store, exploiting a vulnerability known as PolyShell. This flaw affects platforms like Magento Open Source and Adobe Commerce, allowing unauthorized users to execute code by uploading arbitrary files through the REST API.

Widespread Vulnerability Exploitation

Since March 19, 2026, the PolyShell vulnerability has been extensively exploited, with over 50 IP addresses identified in related scanning activities. Sansec noted that approximately 56.7% of susceptible e-commerce sites have been compromised by these attacks.

The skimmer operates by establishing a WebRTC peer connection to a specific IP address (“202.181.177[.]177”) over UDP port 3479. It then injects JavaScript into the webpage to capture payment data, highlighting a major evolution in skimming techniques.

Challenges in Detecting WebRTC Skimmers

The use of WebRTC presents significant challenges for conventional content security policies (CSP). Even stringent CSP settings that block unauthorized HTTP traffic are vulnerable to WebRTC-based data theft. The data channels run over DTLS-encrypted UDP, making it difficult for network security tools focused on HTTP traffic to detect this activity.

Adobe addressed the PolyShell vulnerability with a patch in version 2.4.9-beta1, released on March 10, 2026. However, this fix has not yet been implemented in production environments, leaving many sites exposed.

Recommended Security Measures

To mitigate these risks, site administrators are advised to block access to the “pub/media/custom_options/” directory and conduct thorough scans for web shells, backdoors, and other malicious software. Such proactive measures are crucial in safeguarding e-commerce platforms from these advanced skimmer attacks.

In conclusion, the emergence of WebRTC-based skimmers underscores the need for continuous advancements in cybersecurity practices. As attackers become more sophisticated, so too must the strategies employed to defend against them.

The Hacker News Tags:Adobe Commerce, CSP bypass, Cybersecurity, e-commerce security, Magento vulnerability, Malware, payment skimmer, PolyShell, web security, WebRTC

Post navigation

Previous Post: New npm Attack Targets Developers with Hidden Malware
Next Post: Dell and HP Enhance Quantum-Resistant Security Solutions

Related Posts

Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released The Hacker News
New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes The Hacker News
Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks The Hacker News
Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets The Hacker News
Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure The Hacker News
Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Entra ID Enhances MFA with New Feature
  • Armenian Suspect in RedLine Malware Case Extradited to US
  • Dell and HP Enhance Quantum-Resistant Security Solutions
  • WebRTC Skimmer Evades CSP to Steal E-Commerce Data
  • New npm Attack Targets Developers with Hidden Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Entra ID Enhances MFA with New Feature
  • Armenian Suspect in RedLine Malware Case Extradited to US
  • Dell and HP Enhance Quantum-Resistant Security Solutions
  • WebRTC Skimmer Evades CSP to Steal E-Commerce Data
  • New npm Attack Targets Developers with Hidden Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark