<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>On June 25th, <a href="https://sansec.io/research/polyfill-supply-chain-attack" rel="noopener" target="_blank">Sansec.io</a> discovered that polyfill.io, <span>a popular open source library to support older browsers, was being used to distribute malware.</span> ThreatSTOP has identified a significant uptick in malicious activity originating from the previously trusted service. Our telemetry indicates that a small number of isolated customers have been impacted, revealing alarming trends that necessitate immediate action.<br><br><span style="font-weight: bold;">Understanding the Threat Landscape</span><br><br><span>Polyfill.io was widely adopted for its efficiency in delivering polyfills necessary for browsers to support modern web standards. However, recent developments have transformed this once-reliable service into a conduit for malicious code. Our proactive ThreatSTOP Security, Intelligence, and Research team has detected and blocked millions of requests associated with these threats, ensuring our customers remain protected. Initially, we blocked the </span>www.googie-anaiytics.com<span> domain to prevent redirection (refer to the Sansec.io blog for more details). Subsequently, we implemented further measures to block all malicious domains used by the attackers, including the somewhat controversial step of blocking cdn.polyfill.io entirely to prevent the malicious code from being executed. Namecheap, the registrar for Polyfill.io, has taken the domain offline <a href="https://www.securityweek.com/polyfill-domain-shut-down-as-owner-disputes-accusations-of-malicious-activity/#:~:text=Malware%20%26%20Threats-,Polyfill%20Domain%20Shut%20Down%20as%20Owner%20Disputes%20Accusations%20of%20Malicious,claims%20it%20has%20good%20intentions." rel="noopener" target="_blank">despite the dispute from the current Chinese owners</a>. Additionally, Cloudflare has begun real-time rewrites of cdn.polyfill.io to their own version, further mitigating the risk.</span><br><br><span style="font-weight: bold;">Telemetry Insights</span><br><br>Our latest telemetry data showcases the extent of this emerging threat:<br>- <span style="font-weight: bold;">cdn.polyfill.io</span>: Over 5 million hits detected, highlighting its widespread use and potential for harm.<br>- <span style="font-weight: bold;">polyfill.io</span>: Nearly 1.6 million hits.<br>- <span style="font-weight: bold;">www.googie-anaiytics.com</span>: Over 4,000 hits, representing a clear attempt to masquerade as Google Analytics and deceive users.<br><br>These indicators of compromise (IOCs) underscore the aggressive nature of this campaign, leveraging trusted services to infiltrate and exploit web applications.<br><br><span style="font-weight: bold;">How ThreatSTOP Protects You</span><br><br>ThreatSTOP’s suite of products offers comprehensive protection against such threats:<br><br>1. <span style="font-weight: bold;">Protective DNS</span>: By utilizing our cloud-based DNS servers, customers are shielded from malicious domains like cdn.polyfill.io and polyfill.io. Our cloud infrastructure ensures real-time updates and proactive blocking of harmful content. For customers managing their own DNS servers, our DNS Defense solution provides robust protection by integrating ThreatSTOP intelligence directly into their network infrastructure. This ensures that even locally managed environments are safeguarded against evolving threats.<br><br>2. <span style="font-weight: bold;">IP Defense</span>: This versatile solution allows for the management of block lists on any IP-based system, including routers, firewalls, and AWS WAF. By blocking known malicious IP addresses, IP Defense prevents unauthorized access and mitigates risks associated with compromised domains.<br><br>Our proactive approach is driven by the ThreatSTOP Security, Intelligence, and Research team, who continuously analyze and update protections against command and control, invalid traffic, peer-to-peer communication, data exfiltration, phishing, SPAM, and Distributed Denial of Service (DDoS) activities.<br><br><span style="font-weight: bold;">Recommended Actions</span><br><br>Given the severity of the threat posed by Polyfill.io and its associated domains, we recommend the following immediate actions:<br>1. <span style="font-weight: bold;">Remove Polyfill.io scripts</span>: Eliminate any reference to Polyfill.io from your website to prevent malicious code from reaching your visitors.<br>2. <span style="font-weight: bold;">Reduce External Scripts</span>: Minimize the use of third-party scripts to lower the potential attack surface.<br>3. <span style="font-weight: bold;">Leverage ThreatSTOP Solutions</span>: Utilize our Protective DNS, and IP Defense products to ensure comprehensive protection across all environments.<br><br><span style="font-weight: bold;">Connect with Customers, Disconnect from Risks</span><br><br>For those interested in joining the ThreatSTOP family or learning more about our proactive protections for all environments, we invite you to visit our <a href="/threatstop-platform" rel="noopener" target="_blank">product page</a>. Discover how our solutions can make a significant difference in your digital security landscape. We have pricing for all sizes of customers! Get started with a demo today!<br><br>By staying vigilant and leveraging advanced protective measures, we can collectively enhance our defenses against the ever-evolving cyber threat landscape.</p></span>