What is the attack?Over 100,000+ sites have been impacted by a supply chain attack involving the Polyfill.io service. Polyfill is a popular tool used for enhancing browser capabilities by hundreds of thousands of sites to ensure that all website visitors can use the same codebase for unsupported functionality. Earlier this year, the polyfill.io domain was purchased, and the script was modified to redirect users to malicious and scam sites.What is the recommended Mitigation?Given the confirmed malicious operations, owners of websites using polyfill.io are advised to remove it immediately and search their code repositories for instances of polyfill.io. Users are also advised to consider using alternate services provided by Cloudflare and Fastly.What FortiGuard Coverage is available?FortiGuard Labs’ research team is investigating the coverage and has blocked all the known Indicators of compromise (IoCs).
More Stories
yarnpkg-1.22.22-2.fc40
FEDORA-2024-eef12396fc Packages in this update: yarnpkg-1.22.22-2.fc40 Update description: Backport fix for CVE-2024-4067. Read More
pgadmin4-7.8-7.fc39
FEDORA-2024-9820d9491f Packages in this update: pgadmin4-7.8-7.fc39 Update description: Backport security fixes for CVE-2024-4216, CVE-2024-4068, CVE-2024-4067. Read More
USN-6879-1: Virtuoso Open-Source Edition vulnerabilities
Jingzhou Fu discovered that Virtuoso Open-Source Edition incorrectly handled certain crafted SQL statements. An attacker could possibly use this issue...
USN-6866-2: Linux kernel (Azure) vulnerabilities
It was discovered that the ext4 file system implementation in the Linux kernel did not properly validate data state on...
USN-6865-2: Linux kernel (Azure) vulnerabilities
It was discovered that the ext4 file system implementation in the Linux kernel did not properly validate data state on...
USN-6870-2: Linux kernel (AWS) vulnerabilities
It was discovered that the Intel Data Streaming and Intel Analytics Accelerator drivers in the Linux kernel allowed direct access...