Polyfill code breach much bigger than previously thought, with nearly 400,000customers affected

A close-up of an interent search bar with 'http://ww' visible
(Image credit: Getty Images)

The Polyfill supply chain attack is possibly around three times bigger than previously thought, experts have warned.

Rather than the 100,000 sites previously thought to be hit, new findings from the Censys Research Team claims a week after Polyfill was observed serving malware, 384,773 sites are still linking to the service. 

“Since the domain was suspended, the supply-chain attack has been halted,” Aidan Holland, a member of the Censys Research Team, wrote in an email. “However, if the domain was to be un-suspended or transferred, it could resume its malicious behavior. My hope is that NameCheap properly locked down the domain and would prevent this from occurring.”

More than a million victims

Here is a little background: polyfill is a piece of JavaScript code that allows older browsers to run newer functions, which they don’t natively support. The polyfill[.]io website was a popular service provider for this solution, which seems to have been used by at least 380,000 different websites.

In February 2024, the site and the accompanying GitHub account were sold to a Chinese company called Funnul. A few months later, in late June, cybersecurity researchers from Sansec reported that the domain started redirecting visitors to adult and gambling websites, and was obviously doing it with malice, since the redirections were only performed at certain times of day, and to visitors that ticked all the right boxes. Funnul did not reply to anyone’s request for comment. 

When Sansec sounded the alarm, Cloudflare and Fastly set up their own versions of the Polyfill.io service, giving users a trusted alternative. "No website today requires any of the polyfills in the http://polyfill.io library," tweeted the original Polyfills service project developer. "Most features added to the web platform are quickly adopted by all major browsers, with some exceptions that generally can't be polyfilled anyway, like Web Serial and Web Bluetooth."

Google also chimed in, notifying affected advertisers about their landing pages now possibly redirecting visitors away from their intended destination, and towards possibly malicious websites. 

That being said, having hundreds of thousands of websites still linking to the malicious service is a major red flag. To make matters worse, among them seem to be a couple of high-profile players, such as Hulu; Mercedes-Benz, Warner Bros., and even a couple of websites belonging to the US government, ArsTechnica reported. 

And that’s not all. Funnul owns a number of other domains that perform malicious activity, similar to that on polyfill, and when combined, more than 1.6 million sites were linking to them. 

Via ArsTechnica

More from TechRadar Pro

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A close-up of an interent search bar with 'http://ww' visible
Major website hijacking scam sees over 35,000 sites attacked, redirected to gambling sites, so be on your guard
chrome firefox extensions
Google Chrome extensions hit in major attack - dozens of developers affected, so be on your guard
Chrome icon on Android
Google Chrome extensions hack may have started much earlier than expected
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
Over 10,000 WordPress sites found showing fake Google browser update pages to spread malware
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
Thousands of WordPress websites hit in new malware attack, here's what we know
Latest in Security
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
China
Notorious Chinese hackers FamousSparrow allegedly target US financial firms
A digital representation of a lock
NYU website defaced as hacker leaks info on a million students
NHS
NHS IT supplier hit with major fine following ransomware attack
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does