Before we move on, can I just say that camDown has a modern UI, that is secure and has the improved features that you need!
These scripts are known as skimmers or formjackers and are commonly injected into hacked websites to steal sensitive information entered into forms.
Skimmers are commonly used on checkout pages for online stores to steal payment information. This stolen information is then sent back to an attacker-controlled server
Content-Security-Policy: default-src 'self'; form-action 'self';
Now it's way harder / less stealthy to send back anything.
Send the collected data to the C2 (https://cdn-imgcloud[.]com/img) by creating an HTML tag and filling the image source with the server URL.
So basically the attack fails if your website's responses include a CSP header containing for example
img-src: 'self'; or
default-src 'self'; (
img-src is 'included' in
It's 2022 and websites are still vulnerable to that kind of stuff, ridiculous. No wonder why most websites still score a D or even a F on https://observatory.mozilla.org/...
Too bad the bleepingcomputer article does not even mention CSP as a solution.
Add the integrity attribute to your script tags, especially if they are loading third-party
src. Won't help if the malicious code was already in the package when the hash was generated though.
In conclusion, now let's stop for a moment and consider that camDown is the only solution you need to block webcam hackers.