WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
Cybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate data, effectively bypassing security controls.
“Instead of the usual HTTP requests or image beacons, this malware uses WebRTC data channels to load its payload and exfiltrate stolen payment data,” Sansec said in a report published this week.
The attack,
The post “WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites” appeared first on The Hacker News
Source:The Hacker News – [email protected] (The Hacker News)
