Uncovering the Polyfill.io Supply Chain Attack

Uncovering the Polyfill.io Supply Chain Attack

Jul 8, 2024

Use Snyk for free to find and fix security issues in your applications today! https://snyk.co/ugLYn

In this video, we will be uncovering how a sneaky supply chain attack on the JavaScript Polyfill.io service compromised websites across the globe, including big names like Intuit, Square, the U.S. government and more. Stay tuned to find out how the attack occurred and what you can do to prevent it!

Learn more about this supply chain attack with polyfill[.]io and more in the related blog post: https://snyk.co/ug9d7

✍️ Resources ✍️

Latest list of domains impacted:

  • polyfill[.]io
  • bootcdn[.]net
  • bootcss[.]com
  • staticfile[.]net
  • staticfile[.]org
  • unionadjs[.]com
  • xhsbpza[.]com
  • union.macoms[.]la
  • newcrbpc[.]com

⏲️ Chapters ⏲️

00:00 - Intro

00:28 - What is a pollyfill and how does it work?

01:33 - How the attack started (February 2024)

02:09 - Google's Compromised Website Error Message (June 21st 2024)

02:33 - Published findings on malicious code (June 25th 2024)

02:57 - What happened since the findings

04:55 - What should you do?

05:45 - Security best practices

06:12 - Moral of the story?

06:26 - Outro

⚒️ About Snyk ⚒️

Snyk helps you find and fix vulnerabilities in your code, open-source dependencies, containers, infrastructure-as-code, software pipelines, IDEs, and more! Move fast, stay secure.

Learn more about Snyk: https://snyk.co/ugLYl

📱 Connect with Us 📱

🖥️ Website: https://snyk.co/ugLYl
🐦 X: http://twitter.com/snyksec
💼 LinkedIn: https://www.linkedin.com/company/snyk
💬 Discord: https://discord.gg/devsecops-community-918181751526948884

🔗 Hashtags 🔗

#devsecops #polyfillio #supplychain #security