Cybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate data, effectively bypassing security controls. "Instead of the usual HTTP requests or image beacons, this malware uses WebRTC data channels to load its payload
โกQuick SummaryAI generating...
I
info@thehackernews.com (The Hacker News)
๐ก
Original Source
The Hacker News
https://thehackernews.com/2026/03/webrtc-skimmer-bypasses-csp-to-steal.htmlCybersecurity researchers have discovered a new payment skimmer that uses WebRTC data channels as a means to receive payloads and exfiltrate data, effectively bypassing security controls.
"Instead of the usual HTTP requests or image beacons, this malware uses WebRTC data channels to load its payload and exfiltrate stolen payment data," Sansec said in a report published this week.
The attack,
Tags:#security#the-hacker-news
Found this useful? Share it!
Read the Full Story
Continue reading on The Hacker News
Related Stories

๐Security
Iran-Linked Hackers Breach FBI Directorโs Personal Email, Hit Stryker With Wiper Attack
1 day ago

๐Security
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
1 day ago

๐Security
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
1 day ago

๐Security
TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
1 day ago
