WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

Summary

Cybersecurity researchers have identified a new payment skimmer that leverages WebRTC data channels to receive malicious payloads and exfiltrate stolen payment data from e-commerce websites. This novel approach circumvents traditional security measures by avoiding standard HTTP requests.

IFF Assessment

FOE

This is bad news for defenders as it introduces a new, sophisticated technique for stealing sensitive financial information that bypasses existing security controls.

Defender Context

Defenders should be aware of this WebRTC-based skimming technique and investigate how their web application firewalls and intrusion detection systems can identify and block such traffic. Monitoring for unusual WebRTC activity and ensuring robust content security policies are in place will be crucial.

Read Full Story →