The new Chinese owner of the popular Polyfill JS project injects malware into more than 100 thousand sites

0x815@feddit.org to Technology@lemmy.world – 889 points –
Polyfill supply chain attack hits 100K+ sites
sansec.io

Archived link

The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. Notable users are JSTOR, Intuit and World Economic Forum. However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io. Any complaints were quickly removed (archive here) from the Github repository.

127

You are viewing a single comment

Running npm install would give me a mini heart attack

It should; but more because it installs things right off the net with no validation. Consistency of code product is not the only thing you're tossing.

How else would you get LPAD ? Expect me to write 2 lines of code when I could just import a 100 Mb library to do it for me?

You need to get up to date from three years ago. NodeJS 16.20, or thereabouts, enabled dependency auditing by default.

I’m still fighting my engineers go get current enough to use this (but we do have a proxy artifact server that also attempts to keep downloads clean, and a dependency scanner)