Security

Research

Polyfill.io owner punches back at 'malicious defamation' amid domain shutdown

No supply-chain attacks to see over here!


Updated After having its website shut down, the polyfill.io owner is fighting back against claims it smuggled suspicious code onto websites all across the internet.

In a series of angry Xeets over the past three days, what's likely the CDN operator that owns the Polyfill service accused Cloudflare, the media, and others of "malicious defamation" and "slander." 

"We have no supply chain risks," the org claimed in one of several posts.

The angry missives follow multiple warnings from experts in the computer security industry — and even the creator of the open source Polyfill service project — telling anyone with a website using any JavaScript code from the polyfill.io domain to immediately remove it.

Following all that criticism, domain registrar Namecheap shut down polyfill.io. The site has since relaunched as polyfill[.]com, billed as a "free CDN for open source projects."

Back in February, CDN operator Funnull bought the .io domain and its associated GitHub account. Sometime after that, polyfill.io was caught sneaking naughty code onto sites in a supply-chain attack, according to e-commerce security outfit Sansec. More than 100,000 websites were at the start of the week carrying the site's scripts, the Sansec forensic team said.

We should note Funnull claims to be based in Slovenia while also "made in the USA," its various office addresses around the world on its main website don't exist, and its WhatsApp and WeChat contact number is in the Philippines. The site's underlying language and Telegram profile is in Mandarin, leading many to suspect the business is some kind of Chinese entity or is targeting Chinese customers. The Polyfill Twitter account meanwhile says it's based in the UK.

What's more, a Chinese-language outfit called ACB Group that advertises a range of web products, from CDNs to adult live-streaming video technology, may be the parent of Funnull as ACB offers Funnull as a CDN solution. One of Funnull's side sites also gives a real address in Manila, which may be where at least some of the team works.

Following the domain's sale in February, Cloudflare warned about it posing a supply-chain risk: Whoever controlled the .io could change the JavaScript code it offered to malicious scripts and infect a ton of sites all in one go. By Wednesday, Cloudflare said those worries had become a reality, and reported the Polyfill.io service was being used to inject malicious code into browsers.

Specifically, according to Cloudflare, "the polyfill.io service was being used to inject nefarious code that, under certain circumstances, redirected users to other websites." Sansec went into more detail in an earlier write-up, noting:

The polyfill code is dynamically generated based on the HTTP headers, so multiple attack vectors are likely. Sansec decoded one particular malware which redirects mobile users to a sports betting site using a fake Google analytics domain. The code has specific protection against reverse engineering, and only activates on specific mobile devices at specific hours. It also does not activate when it detects an admin user. It also delays execution when a web analytics service is found, presumably to not end up in the stats.

"This is a real threat to the internet at large given the popularity of this library," Cloudflare CEO and co-founder Matthew Prince noted in an advisory on Wednesday along with CTO John Graham-Cumming and senior director Michael Tremante. 

The cloud giant also spun up an automatic JavaScript URL rewriting service to make it easier for any Cloudflare-proxied websites to replace code from polyfill.io with that from Cloudflare's mirror.

"This will avoid breaking site functionality while mitigating the risk of a supply chain attack," the trio wrote. This feature has already activated on any website with a free plan, and paid-plans can turn it on with one click.

On Thursday, again via X/Twitter, whoever is behind the Polyfill service responded, describing Cloudflare's actions as "deplorable."

"Moving forward, I will be fully dedicated to developing a global CDN product that surpasses Cloudflare, showcasing the true power of capital," they added. The site owner claimed to have $50 million in funding, and added "the product design has been finalized." ®

Updated to add at 2000 UTC

It appears polyfill[dot]com is already toast. It does not resolve to any IP address, rendering it dead.

Send us news
28 Comments

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools

Biden signs sweeping cybersecurity order, just in time for Trump to gut it

Ransomware, AI, secure software, digital IDs – there's something for everyone in the presidential directive

Microsoft eggheads say AI can never be made secure – after testing Redmond's own products

If you want a picture of the future, imagine your infosec team stamping on software forever

Look for the label: White House rolls out 'Cyber Trust Mark' for smart devices

Beware the IoT that doesn’t get a security tag

CISA: Wow, that election had a lot of foreign trolling. Trump's Homeland Sec pick: And that's none of your concern

Cyber agency too 'far off mission,' says incoming boss Kristi Noem

After China's Salt Typhoon, the reconstruction starts now

If 40 years of faulty building gets blown down, don’t rebuild with the rubble

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

What happens when someone subpoenas Cloudflare to unmask a blogger? This...

Ex-politician in UK claims he's been defamed – and goes to court in US for answers

Database tables of student, teacher info stolen from PowerSchool in cyberattack

Class act: Cloud biz only serves 60M-plus folks globally, no biggie

OpenAI's ChatGPT crawler can be tricked into DDoSing sites, answering your queries

The S in LLM stands for Security