This website uses cookies

Our website, platform and/or any sub domains use cookies to understand how you use our services, and to improve both your experience and our marketing relevance.

📣 Join Our FREE WordPress Security Bootcamp (Online Event): March 18-19, 2025 Register Now→

Polyfill[.]io Attack Hits Over 380,000 Hosts, Including Major Companies

Updated on July 5, 2024

2 Min Read
Polyfill[.]io Attack Hits Over 380,000 Hosts, Including Major Companies

The supply chain attack on the widely-used Polyfill[.]io JavaScript library has impacted over 380,000 hosts, according to recent findings from Censys. This attack includes references to malicious domains “https://cdn.polyfill[.]io” or “https://cdn.polyfill[.]com” embedded in HTTP responses as of July 2, 2024.

“Approximately 237,700 of these hosts are located within the Hetzner network (AS24940), primarily in Germany,” Censys reported. Hetzner, being a popular web hosting service, is heavily used by many website developers.

Further investigation revealed that domains tied to prominent companies like WarnerBros, Hulu, Mercedes-Benz, and Pearson were affected, referencing the malicious endpoints.

Cybersecurity The attack was first identified in late June 2024 when Sansec noted that code hosted on the Polyfill domain had been altered to redirect users to adult- and gambling-themed websites. These redirections were time-specific and targeted specific visitors.

The malicious behavior was introduced after the domain and its associated GitHub repository were sold to a Chinese company named Funnull in February 2024. This prompted Namecheap to suspend the domain, and Cloudflare and Google took steps to mitigate the attack by replacing Polyfill links with safe alternatives and blocking ads for sites using the malicious domain. Also, check out Namecheap alternatives if you are looking for a hosting.

Despite attempts to relaunch under a new domain, polyfill[.]com, this too was taken down by Namecheap on June 28, 2024. However, domains like polyfill[.]site and polyfillcache[.]com have since emerged, with the latter still active.

A broader network of potentially related domains, including bootcdn[.]net, bootcss[.]com, staticfile[.]net, and unionadjs[.]com, has been linked to the Polyfill maintainers, suggesting a larger malicious campaign. Notably, bootcss[.]com has been engaging in similar malicious activities since June 2023, affecting 1.6 million public-facing hosts.

The WordPress security firm Patchstack warned of cascading risks from the Polyfill supply chain attack on sites running the CMS through dozens of legitimate plugins that link to the rogue domain.

The scale of this supply chain attack underscores the importance of vigilant monitoring and prompt action to safeguard web infrastructure against malicious exploits.

Share your opinion in the comment section. COMMENT NOW

Share This Article

Start Growing with Cloudways Today.

Our Clients Love us because we never compromise on these

Abdul Rehman

Abdul is a tech-savvy, coffee-fueled, and creatively driven marketer who loves keeping up with the latest software updates and tech gadgets. He's also a skilled technical writer who can explain complex concepts simply for a broad audience. Abdul enjoys sharing his knowledge of the Cloud industry through user manuals, documentation, and blog posts.

×

Webinar: How to Get 100% Scores on Core Web Vitals

Join Joe Williams & Aleksandar Savkovic on 29th of March, 2021.

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Want to Experience the Cloudways Platform in Its Full Glory?

Take a FREE guided tour of Cloudways and see for yourself how easily you can manage your server & apps on the leading cloud-hosting platform.

Start my tour