UPDATED 18:34 EDT / JUNE 26 2024

SECURITY

Supply chain attack compromises 100,000 websites via polyfill.io domain takeover

About 100,000 sites have potentially been compromised in a supply chain attack following an alleged Chinese firm’s takeover of a popular open-source library.

The compromise involved the acquisition of polyfill.io, a domain name linked to the open-source Polyfill project, in February. Polyfill.io is a service that automatically provides the necessary polyfills — pieces of code that enable modern web features to work in older browsers — to ensure that modern websites work seamlessly across different browsers.

According to researchers at Sansec Technology Co Ltd., since the domain and its GitHub account were acquired, the domain has started injecting malware on mobile devices via any site that embeds cdn.polyfill.io. The polyfill code is dynamically generated based on HTTP headers, and Sansec notes that this opens site visitors to multiple attack vectors.

In a separate report, C/side noted that “the malicious code dynamically generates payloads based on HTTP headers, activating only on specific mobile devices, evading detection, avoiding admin users and delaying execution. The code is also obfuscated.”

The result is that sites using polyfill.io may, without their knowledge, redirect visitors away from their intended destination and to a malicious site. So far, users have reportedly been redirected to sports betting and adult content websites.

The compromise has also gained attention from Google LLC, which is now sending warnings about loading third-party JavaScript from domains, including polyfill.io and others.

Although the details of the compromise and malware injection are only making headlines today, the service’s original creator, Andrew Betts, warned on Feb. 26 that anyone using the site should remove it immediately.

Eyal Paz, vice president of research at application security posture management platform provider OX AppSec Security Ltd., told SiliconANGLE that the supply chain attack highlights a critical issue with current-day web development: the trust placed in third-party libraries.

“AppSec teams need full visibility into all software deployed throughout their organization’s ecosystem,” Paz said. “To accomplish this, companies should be able to generate a Software Bill of Materials, which provides an accurate inventory of all of the components used in an application. Companies must also regularly assess the security posture of third-party libraries, using strong vulnerability management practices, to reduce the probability of transitive vulnerabilities and increased cyber risk.”

Image: Pixabay

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU