Kaspersky official blog 2024年07月06日
Why you need to remove the Polyfill.io script from your website
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Polyfill.io,一个提供浏览器兼容性补丁的在线服务,被发现存在恶意代码,该代码会将网站用户重定向到一个越南体育博彩网站。该恶意代码已经影响了超过10万个网站,包括一些大型网站。Google Ads 也已经停止了在使用 Polyfill.io 的网站上投放广告。建议网站管理员立即删除 Polyfill.io 脚本,并考虑停止使用 polyfills。

😨 **Polyfill.io 被发现存在恶意代码**: 研究人员发现,cdn.polyfill.io 已经开始向使用 Polyfill.io 的网站用户发送恶意代码,这些代码会将用户重定向到一个越南体育博彩网站。

😨 **恶意代码影响广泛**: 该恶意代码已经影响了超过 10 万个网站,包括一些大型网站。

😨 **Google Ads 停止在使用 Polyfill.io 的网站上投放广告**: 为了保护用户安全,Google Ads 已经停止了在使用 Polyfill.io、Bootcss.com、Bootcdn.net 和 Staticfile.org 等服务提供商的网站上投放广告。

✅ **立即删除 Polyfill.io 脚本**: 网站管理员应立即删除 Polyfill.io 脚本,并考虑停止使用 polyfills。

✅ **使用替代方案**: 如果您无法完全停止使用 polyfills,可以使用 Cloudflare 或 Fastly 等替代方案。

✅ **减少外部脚本数量**: 减少网站使用的外部脚本数量可以降低网站的安全性风险。

If your website uses the script from Polyfill.io, we recommend removing it ASAP: the service is sending malicious code to your visitors. This article explains what Polyfill.io is for, why it’s become dangerous to use, and what you should do about it if you do use it.

What polyfills and Polyfill.io are

A polyfill is a piece of code that implements features otherwise unsupported by certain browser versions. This is typically JavaScript code that adds support for HTML5, CSS3, JavaScript API and other standards and technologies that spare web developers the headache of supporting exotic or outdated browsers. Polyfills saw their heyday in the 2010s as HTML5 and CSS3 gradually took over the Web.

Polyfill.io is a service that helps automatically deliver polyfills that a browser requires for displaying a particular website.

The service gained popularity both for its efficiency (only the polyfills you need are loaded) and for its regular updates to the technologies and standards used. Straightforward implementation was a factor as well: all the developer needed to start using Polyfill.io was to add a short string to the website code in order to enable the service’s script.

Polyfill.io was originally created by the Financial Times web development team. In February 2024, the service, along with the associated domain and GitHub account, was sold to the Chinese CDN provider Funnull. It wasn’t six months before trouble began.

Malicious code from cdn.polyfill.io

On June 25, 2024, researchers at Sansec discovered that cdn.polyfill.io had begun to deliver malicious code to users of websites that used Polyfill.io. The code used a typosquatted domain pretending to be Google Analytics — [code] www.googie-anaiytics.com[/code] — to redirect users to a Vietnamese sports betting site.

The malicious code redirected the users of compromised sites to a sports betting site written in Vietnamese

According to the researchers, this wasn’t the first time that Polyfill.io had been caught spreading malicious code. Those who had noticed the dangerous behavior earlier tried complaining (archived link) in GitHub comments, but the new owners of Polyfill.io quickly removed all the criticisms (here’s another example from the Internet Archive).

The potentially harmful script is allegedly present on more than 100,000 websites — some of them rather big ones.

Google Ads: one more reason to remove Polyfill.io

In case visitors getting a malicious script doesn’t sound too worrying, Google Ads is giving website operators a further valid reason to hurry up and get the problem fixed.

Google’s advertising service has suspended the display of ads linking to websites that spread malicious scripts from several services. Besides Polyfill.io, the list includes Bootcss.com, Bootcdn.net and Staticfile.org.

A Google Ads suspension warning due to the website using a malicious script downloaded from Polyfill.io, Bootcss.com, Bootcdn.net or Staticfile.org. Source

You’d be wise to stop using the aforementioned services on your website, or else you risk losing traffic due to users being led away by the malicious scripts and because of Google Ads no longer promoting you.

Protecting against the Polyfill.io attack

Here are a few steps to take about the attack:

The Polyfill.io developer recommends removing Polyfill.io and dropping polyfills altogether as these are no longer relevant. Source

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Polyfill.io 恶意代码 网站安全 Google Ads
相关文章