/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Researchers: polyfill.io, which offers JavaScript polyfills, is being used to infect 100K+ websites with malware, after a Chinese CDN bought the domain in 2024

The Register Jessica Lyons

Discussion

  • @prehnra@mastodon.social Robert Prehn on mastodon
    Can we, as an industry, agree to stop serving our users executable code off of random domains that we don't control?  —  https://sansec.io/...
  • @TheRealPomax@mastodon.social @TheRealPomax@mastodon.social on mastodon
    Can someone explain why the owner of the .io TLD isn't legally responsible for immediately nuking polyfill.io because it's literally the same as “buying a phone exchange do you can MitM all conversions, and you are that man”? …
  • @rooneymcnibnug@mastodon.social @rooneymcnibnug@mastodon.social on mastodon
    fwiw, I just blocked some polyfill.io domains that are being used for this supply chain attack ( https://cside.dev/... in latest commit to my SNAFU list: https://github.com/... #pihole
  • @cloudflare @cloudflare on x
    Given supply chain risk, Cloudflare launched an alternative endpoint to polyfill under cdnjs in February 2024. We would strongly encourage immediate replacement of any remaining links to polyfill with the cdnjs alternative endpoint. https://blog.cloudflare.com/ ...
  • @kentcdodds Kent C. Dodds on x
    When I worked at PayPal I knew it would be irresponsible to use a third party service without an SLA so I grabbed the accompanying module and deployed it alongside our app so we could get the benefits with reduced risk. My concern was well-founded. https://kentcdodds.com/...
  • @weldpond @weldpond on x
    If your website uses https://polyfill.io/, remove it immediately. In Feb, a Chinese company bought the domain & Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds https://cdn.polyfill.io/ https://sansec.io/...
  • @sansecio @sansecio on x
    After our Polyfill publication, someone launched a DDoS attack against our infra. We restored our primary services, but now the attack has shifted to our payment provider who has temporarily suspended us. https://x.com/... [image]
  • @spazef0rze Michal Špaček on x
    Google is now sending a warning about loading 3rd party JS from domains like polyfill . io bootcss . com bootcdn . net & staticfile . org that may do nasty things to your users if your site uses JS from these domains. [image]
  • r/Frontend r on reddit
    Heads-up for polyfill.io users