Security researchers at Sansec have identified a novel payment skimmer that leverages WebRTC data channels to both receive malicious payloads and exfiltrate stolen payment information. This technique diverges from traditional skimmer malware that typically relies on HTTP requests or image beacon methods for communication, enabling it to bypass common web security controls.

The malware operates by establishing WebRTC data channel connections within compromised e-commerce websites. Once established, these channels allow bidirectional communication between the attacker’s infrastructure and the infected site, facilitating stealthy payload updates and continuous exfiltration of payment card data captured during customer transactions.

This method exploits the peer-to-peer communication capabilities inherent to WebRTC (Web Real-Time Communication), a protocol designed for direct browser-to-browser communication. By utilizing data channels, the skimmer avoids detection mechanisms that monitor standard HTTP traffic, making it challenging for traditional network-based intrusion detection systems to flag malicious activity.

Sansec’s report emphasizes that the malware targets online retailers, particularly those using platforms vulnerable to script injection attacks or supply chain compromises. The malware persists on the checkout pages, intercepting payment details entered by customers. It then transmits the stolen data through encrypted WebRTC channels to the attacker-controlled command-and-control (C2) servers.

The use of WebRTC for C2 communication also complicates traffic analysis, as these channels are often whitelisted or overlooked by security appliances due to their legitimate use cases in web applications. This skimmer’s capability to dynamically load payloads via WebRTC allows attackers to update malicious code without triggering changes detectable by static file integrity monitoring.

Affected platforms primarily include e-commerce websites running JavaScript-based payment forms, regardless of the underlying content management system or platform. Cases linked to this malware have been reported across various industries, including retail and hospitality.

Detection methods recommended by Sansec involve monitoring for anomalous WebRTC data channel activity within web applications, especially during checkout processes. Security teams should deploy behavioral analytics tools capable of identifying unusual peer-to-peer connections originating from browser sessions.

Removal guidance includes auditing and sanitizing all third-party scripts and dependencies integrated into the website. Employ Content Security Policy (CSP) headers to restrict unauthorized script execution and regularly scan for unauthorized JavaScript injections. Updating web application firewalls (WAFs) to recognize WebRTC misuse patterns can also aid in mitigation.

This discovery underscores the evolving tactics of web skimmer malware and the necessity for advanced detection strategies that encompass non-traditional communication protocols like WebRTC.