• Topics
  • Artificial wisdom
  • Autopilot
  • network
  • Processor
  • 手機
  • exhibition activities
    • CES
      • CES 2014
      • CES 2015
      • CES 2016
      • CES 2017
      • CES 2018
      • CES 2019
      • CES 2020
    • MWC
      • MWC 2014
      • MWC 2015
      • MWC 2016
      • MWC 2017
      • MWC 2018
      • MWC 2019
    • Computex
      • Computex 2014
      • Computex 2015
      • Computex 2016
      • Computex 2017
      • Computex 2018
      • Computex 2019
    • E3
      • E3 2014
      • E3 2015
      • E3 2016
      • E3 2017
    • IFA
      • IFA 2014
      • IFA 2015
      • IFA 2016
      • IFA 2017
    • TGS
      • TGS 2016
  • About us
    • About mashdigi
    • mashdigi website contact details
2026 / 04 / 15 01:47 Wednesday
  • Login
mashdigi-Technology, new products, interesting news, trends
  • Topics
  • Artificial wisdom
  • Autopilot
  • network
  • Processor
  • 手機
  • exhibition activities
    • CES
      • CES 2014
      • CES 2015
      • CES 2016
      • CES 2017
      • CES 2018
      • CES 2019
      • CES 2020
    • MWC
      • MWC 2014
      • MWC 2015
      • MWC 2016
      • MWC 2017
      • MWC 2018
      • MWC 2019
    • Computex
      • Computex 2014
      • Computex 2015
      • Computex 2016
      • Computex 2017
      • Computex 2018
      • Computex 2019
    • E3
      • E3 2014
      • E3 2015
      • E3 2016
      • E3 2017
    • IFA
      • IFA 2014
      • IFA 2015
      • IFA 2016
      • IFA 2017
    • TGS
      • TGS 2016
  • About us
    • About mashdigi
    • mashdigi website contact details
No Result
View All Result
  • Topics
  • Artificial wisdom
  • Autopilot
  • network
  • Processor
  • 手機
  • exhibition activities
    • CES
      • CES 2014
      • CES 2015
      • CES 2016
      • CES 2017
      • CES 2018
      • CES 2019
      • CES 2020
    • MWC
      • MWC 2014
      • MWC 2015
      • MWC 2016
      • MWC 2017
      • MWC 2018
      • MWC 2019
    • Computex
      • Computex 2014
      • Computex 2015
      • Computex 2016
      • Computex 2017
      • Computex 2018
      • Computex 2019
    • E3
      • E3 2014
      • E3 2015
      • E3 2016
      • E3 2017
    • IFA
      • IFA 2014
      • IFA 2015
      • IFA 2016
      • IFA 2017
    • TGS
      • TGS 2016
  • About us
    • About mashdigi
    • mashdigi website contact details
No Result
View All Result
mashdigi-Technology, new products, interesting news, trends
No Result
View All Result
This is an advertisement.
Home Life

Hackers' "Silent" Robbery Techniques! A New WebRTC Skimming Attack Emerges, Bypassing CSP Protection and Severely Damaging Major E-commerce Companies and Multinational Automakers

Hackers have secretly stolen consumers' credit card information right under the guards' noses via UDP communication.

Author: Mash Yang
2026-03-28
in Life, network, software
A A
0
Share to FacebookShare on TwitterShare to LINE

Just when we thought e-commerce websites' checkout pages were securely protected, hackers have already moved beyond traditional communication protocols. Cybersecurity company Sansec recently...Issue a warningThe report points out that a new type of web skimming attack is spreading globally. Unlike previous malicious scripts, this attack is the first to utilize the peer-to-peer WebRTC (Web Real-Time Communication) mechanism to skim credit card information, successfully bypassing existing network monitoring tools and content security policies (CSPs). In the past two months, five multinational giants with market capitalizations of several billion dollars have been victimized, including the top three U.S. banks and a car manufacturer with a market capitalization of over 100 billion dollars.

Hackers' "Silent" Robbery Techniques! A New WebRTC Skimming Attack Emerges, Bypassing CSP Protection and Severely Damaging Major E-commerce Companies and Multinational Automakers

Why WebRTC? A perfect cloak of invisibility to bypass CSPs and HTTP monitoring.

Past Magecart online or card skimming attacks mostly involved implanting malicious JavaScript and then sending the stolen data back to the hacker's C2 server via HTTP requests. However, with the widespread deployment of Content Security Policies (CSPs) and various Web Application Firewalls (WAFs) by enterprises, the success rate of this method is declining.

But Sansec researchers discovered that the hackers cleverly switched to the WebRTC DataChannel this time:

• Non-traditional traffic:WebRTC uses UDP communication encrypted with DTLS, instead of traditional HTTP connections. Since most enterprise network security tools only perform deep packet inspection on HTTP traffic, WebRTC traffic is essentially invisible.

• CSP's lawless zone:WebRTC is a pairing connection mechanism, and its operation currently operates on the fringes of mainstream CSP specifications. Although the Chrome browser has begun testing support for specific CSP commands to manage WebRTC, due to the lack of industry standardization, almost no websites actually deploy it, allowing hackers to easily bypass defenses.

Combining PolyShell vulnerabilities: The covert tactics from intrusion to fund theft

This sophisticated attack was not without precedent. Sansec points out that the breach through which hackers infiltrated the e-commerce websites was most likely the recently rampant PolyShell vulnerability. This vulnerability has resulted in malicious PHP code being uploaded to nearly 60% of Adobe Commerce and Magento e-commerce platforms.

During the actual attack execution phase, the hackers demonstrated extremely high levels of stealth skills:

• Lightweight loading:In the initial stage, only a very lightweight JavaScript loader is embedded, and the basic CSP limitations are bypassed by reusing existing script nonces or using unsafe-eval.

• Delayed execution (requestIdleCallback):To reduce the chance of being detected by behavior detection mechanisms, malware deliberately exploits the browser's delayed execution mechanism, secretly launching only when system resources are idle.

• Silent theft of funds:Once the WebRTC connection is established and the second-stage malicious payload is received, the program will lurk on the checkout page, intercept the user's credit card number, expiration date, and security code, and directly package and send them to the hacker's server via UDP communication.

Analysis of viewpoints

The new WebRTC skimming attack revealed by Sansec represents a significant "technical upgrade" to Web Skimming online skimming attack techniques.

This is an advertisement.

In the past, defense against e-commerce skimming attacks typically relied on CSPs to "block unauthorized external network connections" and "monitor abnormal HTTP transmissions." However, this time, the hackers directly exploited the underlying communication protocol, using WebRTC technology—originally designed for video calls and P2P file transfers—to send malicious data embedded in encrypted UDP packets. It's like the malicious program has already escaped in a helicopter (WebRTC) while the protection mechanism is still inspecting a regular highway (HTTP).

This is a serious warning for enterprise IT and cybersecurity teams. Especially for e-commerce platforms using Adobe Commerce and Magento, in addition to patching PolyShell vulnerabilities as soon as possible, they must also re-examine whether their network protection mechanisms have the ability to parse non-HTTP traffic. With car manufacturers and top banks, each worth hundreds of billions of dollars, falling victim to this, it shows that this is no longer indiscriminate phishing against small and medium-sized e-commerce companies, but a sophisticated and targeted attack against high-value targets.

Tags: CSPHTTPWeb SkimmingWebRTCSide-viewing attack
ShareTweetShare
Mash Yang

Mash Yang

Founder and editor of mashdigi.com, and student of technology journalism.

Leave a Reply Cancel Reply

The email address that must be filled in to post a message will not be made public. Required fields are marked as *

This site uses Akismet service to reduce spam.Learn more about how Akismet processes website visitor comments.

Translation (Tanslate)

Recent updates:

The ultimate in violent aesthetics! Sony confirms it's developing an R-rated animated film based on Bloodborne, with a well-known YouTuber involved in the production.

The ultimate in violent aesthetics! Sony confirms it's developing an R-rated animated film based on Bloodborne, with a well-known YouTuber involved in the production.

2026-04-15
Apple expands its partnership with Globalstar with another $11 billion to enhance its satellite services to support communication traffic.

Amazon has confirmed its acquisition of Globalstar, which will not only strengthen Amazon Leo's competitiveness but also allow it to take over Apple's SOS satellite communications service.

2026-04-15
In celebration of World Quantum Day, NVIDIA announced the launch of "NVIDIA Ising," the world's first open-source quantum AI model series.

In celebration of World Quantum Day, NVIDIA announced the launch of "NVIDIA Ising," the world's first open-source quantum AI model series.

2026-04-14
mashdigi-Technology, new products, interesting news, trends

Copyright © 2017 mashdigi.com

  • About mashdigi.com
  • Place ads
  • Contact mashdigi.com

Follow us

Welcome back!

Login to your account below

Forgotten Password?

Retrieve your password

Hãy nhập tên người dùng hoặc địa chỉ email để mở mật khẩu

Log In
No Result
View All Result
  • About mashdigi.com
  • Place ads
  • Contact mashdigi.com

Copyright © 2017 mashdigi.com