Polyfill supply chain attack hits 100K+ sites (sansec.io)
from mox@lemmy.sdf.org to programming@programming.dev on 25 Jun 20:07
https://lemmy.sdf.org/post/18715831

#programming

threaded - newest

mark@programming.dev on 25 Jun 21:12 next collapse

Not many things require a polyfill these days. My guess is a lot of older sites are affected.

stevedidwhat_infosec@infosec.pub on 25 Jun 22:21 collapse

Intuit uses pollyfill… and a lot of people use that service.

Cloudflare and fastly wouldn’t be setting up mirrors if it weren’t still being used, I can guarantee that.

onlinepersona@programming.dev on 25 Jun 21:46 next collapse

Opensource devs need to get paid a living wage 😩 This stuff keeps happening and somehow, I can’t completely blame the devs. Thousands of sites use the product and barely anybody donates. It’s not sustainable.

Anti Commercial-AI license

stevedidwhat_infosec@infosec.pub on 25 Jun 22:23 collapse

This has almost nothing to do with what you’re talking about.

A Chinese company bought the domain and the service in February and are attacking people in highly specific conditions. (Mobile devices at specific times)

This is an attack. Not negligence, not an uh oh oopsie woopsie fucky wucky. Attack.

onlinepersona@programming.dev on 26 Jun 06:33 next collapse

<img alt="" src="https://web.archive.org/web/20240229113710/https://private-user-images.githubusercontent.com/38493722/307656021-dba4f089-d342-478f-afd5-0c6672028e90.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.nkid9JhYsUsRRbTZtXLF2ds9s5H35pUE2lRG6yx-dCg">

stevedidwhat_infosec@infosec.pub on 26 Jun 14:03 collapse

… he made plenty off the product and made additional when he sold. Devs ability to make money has nothing to do with companies coming in and injecting malware to the service.

Any threat actor group with sufficient funds from various campaigns, spyware, etc could use said funds to buy out a dev, owner, etc.

Not to mention state-sponsored threat actors. This is the perfect example of distracting from the fact of what happened.

onlinepersona@programming.dev on 26 Jun 14:39 collapse

You don’t believe that income (or lack thereof) can motivate the sale of a popular library to a shady party?

Any threat actor group with sufficient funds from various campaigns, spyware, etc could use said funds to buy out a dev, owner, etc.

I don’t see VLC being bought out.

This is the perfect example of distracting from the fact of what happened.

If you say so… this isn’t the first time an underpaid opensource dev sold their project only for it to end up being used for ads or malware.

Anti Commercial-AI license

stevedidwhat_infosec@infosec.pub on 26 Jun 14:49 collapse

Not at all what I meant. The premise was that this wouldn’t happen if they were being paid fairly. Supply chain attacks happen with or without fair pay.

Look at what happened with the XZ backdoor. Whether or not they’re getting paid just means a different door is opened.

The root of the problem is that we blindly trust anyone based on name-brand and popularity. That has never in the existence of technology been a reliable nor an effective means of authentication.

If it’s not outright buying out companies it will be vulnerabilities/lack of appropriate management, if it’s not vulns it’ll be insider threat.

These are problems we’ve known about for at least a decade+ and we’ve done fuck all to address the root of the problem.

Never trust, always verify. Simple as that.

sukhmel@programming.dev on 26 Jun 08:43 collapse

I understood the original comment as “if devs were paid they wouldn’t sell out”. Which is probably valid, more or less

stevedidwhat_infosec@infosec.pub on 25 Jun 22:27 collapse

For anyone interested - I’d you are using umatrix to block shit you can punch these lines into a new text file and import as blocklist, then commit it with the tiny arrow that points left toward the permanent list to save it permanently:

* www[.]googie-anaiytics[.]com * block

* kuurza[.]com * block

* cdn[.]polyfill[.]io * block

* polyfill[.]io * block

* bootcss[.]com * block

* bootcdn[.]net * block

* staticfile[.]org * block

* polyfill[.]com * block

* staticfile[.]net * block

* unionadjs[.]com * block

* xhsbpza[.]com * block

* union[.]macoms[.]la * block

* newcrbpc[.]com * block

Remove the square brackets before saving the file - these are here to prevent hyperlinks and misclicks.

Edit: this is not a bulleted list, every line must start with an asterisk, just in case your instance doesn’t update edits made to comments quickly.

Edit2: added new IOCs

Edit3: MOAR IOCS FOR THE HOARDE

gex@lemmy.world on 26 Jun 00:19 collapse

The first domain should be googie-anaiytics, the L in analytics was replaced with an i

stevedidwhat_infosec@infosec.pub on 26 Jun 02:05 collapse

Good catch! Missed that one