WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

Asset Info
CreatorN/A
Registration TimeLoading...
RegistrarThe Hacker News
Capture TimeLoading...
GeolocationN/A
File TypeJPEG
Source TypedigitalUpload
Details
Abstract
Cybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate data, effectively bypassing security controls.
"Instead of the usual HTTP requests or image beacons, this malware uses WebRTC data channels to load its payload and exfiltrate stolen payment data," Sansec said in a report published this week.
The attack,
LicenseN/A
Used Bythehackernews.com...
Mining PreferenceN/A
Integrity Proof