Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WebRTC Skimmer Evades CSP to Steal E-Commerce Data

WebRTC Skimmer Evades CSP to Steal E-Commerce Data

Posted on March 26, 2026 By CWS

Cybersecurity experts have uncovered a sophisticated skimmer that leverages WebRTC data channels to infiltrate and extract payment information from e-commerce websites. This new tactic enables the malware to circumvent traditional security barriers.

Innovative Skimmer Exploits WebRTC

Sansec, a renowned security firm, reported that this skimmer diverges from typical HTTP-based methods by utilizing WebRTC data channels. This technique allows the malware to load its harmful payload and transmit stolen data without being detected by standard security measures.

The skimmer specifically targeted a car manufacturer’s online store, exploiting a vulnerability known as PolyShell. This flaw affects platforms like Magento Open Source and Adobe Commerce, allowing unauthorized users to execute code by uploading arbitrary files through the REST API.

Widespread Vulnerability Exploitation

Since March 19, 2026, the PolyShell vulnerability has been extensively exploited, with over 50 IP addresses identified in related scanning activities. Sansec noted that approximately 56.7% of susceptible e-commerce sites have been compromised by these attacks.

The skimmer operates by establishing a WebRTC peer connection to a specific IP address (“202.181.177[.]177”) over UDP port 3479. It then injects JavaScript into the webpage to capture payment data, highlighting a major evolution in skimming techniques.

Challenges in Detecting WebRTC Skimmers

The use of WebRTC presents significant challenges for conventional content security policies (CSP). Even stringent CSP settings that block unauthorized HTTP traffic are vulnerable to WebRTC-based data theft. The data channels run over DTLS-encrypted UDP, making it difficult for network security tools focused on HTTP traffic to detect this activity.

Adobe addressed the PolyShell vulnerability with a patch in version 2.4.9-beta1, released on March 10, 2026. However, this fix has not yet been implemented in production environments, leaving many sites exposed.

Recommended Security Measures

To mitigate these risks, site administrators are advised to block access to the “pub/media/custom_options/” directory and conduct thorough scans for web shells, backdoors, and other malicious software. Such proactive measures are crucial in safeguarding e-commerce platforms from these advanced skimmer attacks.

In conclusion, the emergence of WebRTC-based skimmers underscores the need for continuous advancements in cybersecurity practices. As attackers become more sophisticated, so too must the strategies employed to defend against them.

The Hacker News Tags:Adobe Commerce, CSP bypass, Cybersecurity, e-commerce security, Magento vulnerability, Malware, payment skimmer, PolyShell, web security, WebRTC

Post navigation

Previous Post: New npm Attack Targets Developers with Hidden Malware
Next Post: Dell and HP Enhance Quantum-Resistant Security Solutions

Related Posts

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 The Hacker News
Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More The Hacker News
Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads The Hacker News
Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks The Hacker News
North Korea-Linked Hackers Target Developers via Malicious VS Code Projects North Korea-Linked Hackers Target Developers via Malicious VS Code Projects The Hacker News
Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Skoda Online Shop Faces Significant Data Breach
  • Enhancing Security: The Rise of Autonomous Purple Teaming
  • GhostLock Exploits File-Sharing to Mimic Ransomware
  • Cloudflare’s Strategic Layoffs Amidst AI Expansion
  • macOS Malware Exploits Google Ads and AI Chats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Skoda Online Shop Faces Significant Data Breach
  • Enhancing Security: The Rise of Autonomous Purple Teaming
  • GhostLock Exploits File-Sharing to Mimic Ransomware
  • Cloudflare’s Strategic Layoffs Amidst AI Expansion
  • macOS Malware Exploits Google Ads and AI Chats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark