WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

Cybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate data, effectively bypassing security controls.
“Instead of the usual HTTP requests or image beacons, this malware uses WebRTC data channels to load its payload and exfiltrate stolen payment data,” Sansec said in a report published this week.
The attack,

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

Next Post

[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

Related Posts
Total
0
Share