Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1229

Web Skimmer / E-Skimming

What is Web Skimmer / E-Skimming?

Web Skimmer / E-SkimmingMalicious code injected into a website that steals payment-card or personal data as customers type it into the page.


A web skimmer (also called an e-skimmer or digital skimmer) is the JavaScript or server-side code that performs the theft in Magecart-style attacks. It lives in the checkout flow of an online store and reads card numbers, CVVs, expiry dates, and personal data directly from the DOM or network requests, then exfiltrates them to a drop server. Skimmers can be added by exploiting CMS vulnerabilities, compromising third-party scripts, hijacking unmaintained S3 buckets, or hijacking admin credentials. Some hide in fake favicons or steganographic images. Defences include Content Security Policy with reporting, Subresource Integrity, client-side script-integrity monitoring required by PCI DSS v4.0, and tight permissions on script tags and tag managers.

Examples

  1. 01

    An obfuscated script appended to a Magento template harvests CVVs and ships them to a typosquatted CDN domain.

  2. 02

    A skimmer hidden inside a fake favicon image fired only on the checkout page of a Shopify store.

Frequently asked questions

What is Web Skimmer / E-Skimming?

Malicious code injected into a website that steals payment-card or personal data as customers type it into the page. It belongs to the Attacks & Threats category of cybersecurity.

What does Web Skimmer / E-Skimming mean?

Malicious code injected into a website that steals payment-card or personal data as customers type it into the page.

How does Web Skimmer / E-Skimming work?

A web skimmer (also called an e-skimmer or digital skimmer) is the JavaScript or server-side code that performs the theft in Magecart-style attacks. It lives in the checkout flow of an online store and reads card numbers, CVVs, expiry dates, and personal data directly from the DOM or network requests, then exfiltrates them to a drop server. Skimmers can be added by exploiting CMS vulnerabilities, compromising third-party scripts, hijacking unmaintained S3 buckets, or hijacking admin credentials. Some hide in fake favicons or steganographic images. Defences include Content Security Policy with reporting, Subresource Integrity, client-side script-integrity monitoring required by PCI DSS v4.0, and tight permissions on script tags and tag managers.

How do you defend against Web Skimmer / E-Skimming?

Defences for Web Skimmer / E-Skimming typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Web Skimmer / E-Skimming?

Common alternative names include: E-skimmer, Digital skimmer, JS sniffer.

Related terms