In recent years, formjacking and Magecart attacks have surged as dominant threats in the e-commerce and digital payments landscape. These client-side attacks silently siphon sensitive data, including credit card numbers, login credentials, and personally identifiable information (PII) directly from users’ browsers, without ever touching the organization’s servers. The attacks bypass traditional perimeter and server-side defenses by injecting malicious JavaScript into third-party scripts or directly into front-end code.
Formjacking relies on injecting malicious JavaScript into online forms to capture user inputs at the browser level. It’s often carried out by exploiting vulnerabilities in third-party scripts or content delivery networks (CDNs), making it difficult to detect using server-side security tools.
Magecart is an umbrella term for a set of cybercriminal groups that specialize in web skimming. These cybercriminal groups typically compromise e-commerce sites by injecting JavaScript code that steals payment data during checkout. This stolen data is then exfiltrated to attacker-controlled domains, often obfuscated or hidden beneath legitimate-looking requests.
Both attack types share a common vector: the browser. And their success hinges on how little visibility organizations have into what actually executes client-side.
With the release of the Payment Card Industry Data Security Standard (PCI DSS) v4.0.1, the PCI Security Standards Council directly addresses the growing threat of client-side attacks. For the first time, the PCI SSC has included two client-side requirements effective March 31, 2025 to directly address this new attack vector:
Requirement 6.4.3: All payment page scripts that are loaded and executed in the consumer’s browser are managed as follows:
Requirement 11.6.1 – A change- and tamper-detection mechanism is deployed as follows:
These new mandates recognize a fundamental truth: client-side scripts are now a critical part of the PCI attack surface. Yet for many organizations, meeting these requirements presents operational and technical hurdles, especially given the dynamic nature of JavaScript ecosystems and reliance on third-party services.
Traditional web application firewalls (WAFs), security information and event management solutions (SIEMs), and endpoint tools operate on the server or network perimeter. They lack visibility into the final execution environment: the user’s browser. Once malicious code is injected—whether through a compromised tag manager, CDN, or a third-party supply chain attack—server-side tools often miss the breach entirely. This is where F5 Distributed Cloud Client-Side Defense steps in.
Unlike server-side tools, Distributed Cloud Client-Side Defense operates in the browser itself, providing real-time monitoring, integrity validation, and alerting on malicious behavior as it happens. And we recently updated the service so it’s purpose-built to address the threats outlined in PCI DSS v4.0.1 requirements 6.4.3 and 11.6.1.
F5 Distributed Cloud Client-Side Defense is purpose-built to address the client-side requirements outlined in PCI DSS v4.0.1.
Here’s how it helps:
As browser-based threats continue to outpace traditional defenses, simply checking the compliance box isn’t enough. Organizations must adopt security controls that provide visibility into what’s really happening with the end-user experience—while building resilience against future threats. F5 Distributed Cloud Client-Side Defense brings the needed observability, control, and automation to stay ahead of formjacking and Magecart threats—while aligning closely with the new demands of PCI DSS v4.0.1.
To learn more, see our F5 Distributed Cloud Client-Side Defense webpage. And if you’re planning to be at this year’s RSA Conference, be sure to attend our April 29 session, “Stronger Together: A Unified Approach to App Security and Delivery” and visit us in Booth N-4335.