More Than 110,000 Websites Impacted by Hacked Polyfill Supply Chain Breach

June 26, 2024NewsroomSupply Chain Breach / Internet Security

Google has implemented measures to prevent advertisements for online shops utilizing the Polyfill.

Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack

June 26, 2024NewsroomSupply Chain Breach / Internet Security

Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack

Google has implemented measures to prevent advertisements for online shops utilizing the Polyfill.io platform after a Chinese firm acquired the domain and altered the JavaScript library (“polyfill.js”) to send users to harmful and fraudulent websites.

According to a report released on Tuesday by Sansec, more than 110,000 websites incorporating the library have been affected by this supply chain breach.

Polyfill is a widely used library that integrates support for contemporary functions in web browsers. Concerns arose earlier in February when a Chinese content delivery network (CDN) company named Funnull acquired the service, as indicated in this notification.

Andrew Betts, the original author of the project, urged website operators to promptly eliminate it, remarking that “none of the polyfills in the polyfill[.]io library are necessary for any present-day website” and that “most enhancements to the web platform are swiftly integrated by all major browsers, with a few exceptions that are generally not polyfillable, such as Web Serial and Web Bluetooth.”

Cybersecurity

This development has also prompted internet infrastructure service providers like Cloudflare and Fastly to propose alternative access points to help users migrate away from polyfill[.]io.

“The concern is that any website embedding a link to the original polyfill[.]io domain would now depend on Funnull for maintaining and securing the underlying project to prevent the risk of a supply chain breach,” observed Cloudflare researchers Sven Sauleau and Michael Tremante in a statement issued at that time.

“Such an attack could transpire if the foundational third-party provider is compromised or amends the served code in deceitful ways, leading to the compromise of all websites leveraging the tool.”

The Dutch e-commerce security firm reported that the domain “cdn.polyfill[.]io” was discovered to be inserting malicious software that diverts users to online betting and adult content websites.

“The code includes specific safeguards against reverse engineering and exclusively activates on particular mobile devices during specific time periods,” the firm explained. “It also refrains from activation when an administrative user is detected and delays execution upon finding a web analytics service, presumably to avoid detection in analytical reports.”

c/side, based in San Francisco, has also released its own advisory, indicating that the domain administrators included a Cloudflare Security Protection header on their site between March 7 and 8, 2024.

Cybersecurity

The revelations come after a warning about a severe security vulnerability affecting Adobe Commerce and Magento websites (CVE-2024-34102, CVSS score: 9.8) that remains largely unaddressed despite patches being available since June 11, 2024.

“On its own, this flaw permits anyone to access private files (such as those containing passwords),” stated Sansec, which nicknamed the exploit chain CosmicSting. “However, in conjunction with the recent iconv bug in Linux, it takes on the form of a security vulnerability that enables remote code execution.”

It has subsequently come to light that external parties can acquire API admin privileges without necessitating a Linux distribution susceptible to the iconv vulnerability (CVE-2024-2961), escalating the severity of the situation.

Found this article intriguing? Follow us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.