If you're using Polyfill.io code on your site-remove it immediately

Discussion in 'other security issues & news' started by stapp, Jun 26, 2024.

  1. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    27,169
    Location:
    UK
    Emsisoft warned me and blocked this from gHacks yesterday. I have just checked and Emsisoft is still blocking it on gHacks site at the moment.
    https://www.theregister.com/2024/06/25/polyfillio_china_crisis/
     
  2. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    985
    Location:
    The Netherlands
  3. Stupendous Man

    Stupendous Man Registered Member

    Joined:
    Aug 1, 2010
    Posts:
    3,097
    Location:
    the Netherlands
    Already blocked by uBlock filters – Badware risks:
    Code:
    ||polyfill.io^$all
     
  4. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    6,294
    Just received the message, thx for the code
     
  5. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    985
    Location:
    The Netherlands
    Yes, I saw it appearing after a refresh of the list. :)
    Removed my own filter.
     
  6. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,921
    Cloudflare - 06/26/2024
    Automatically replacing polyfill.io links with Cloudflare’s mirror for a safer Internet
    https://blog.cloudflare.com/automat...-with-cloudflares-mirror-for-a-safer-internet

    Long article. Read there more!

    Edit: forgot to give the link; now added.
     
  7. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    985
    Location:
    The Netherlands
    Polyfill claims it has been 'defamed', returns after domain shut down
     
  8. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    985
    Location:
    The Netherlands
  9. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,800
    Location:
    Italy
    All of these domains are blocked by NextDNS.

    P.S.

    Some even indicators of compromise are blocked by my TLDs (I blocked all non-European characters + .ru + .cn)



    @nicolaasjan

    It would probably be better to warn MSFN members who use old browsers + Polyfill.
    ;)
     
    Last edited: Jun 28, 2024
  10. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    985
    Location:
    The Netherlands
    Yes, I've been thinking about that as well. :)

    However, Cloudflare already reroutes traffic now.
    What is also important to note, is that the malware targeted mobile devices.
     
  11. nicolaasjan

    nicolaasjan Registered Member

    Joined:
    Sep 23, 2018
    Posts:
    985
    Location:
    The Netherlands
    All of these domains have been added to the "uBlock filters – Badware risks" filter list which is enabled by default.
    See commit.
     
  12. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,921
    Am I now wrong? I don't see this one mentioned anymore:
    Code:
    google-anaiytics[.]com
    It was mentioned in the BleepingComputer article here:
    https://www.bleepingcomputer.com/ne...-been-defamed-returns-after-domain-shut-down/

    PS: I left the "brackets" there in the code (typosquatted domain name). Obviously you can remove the "brackets".

    Edit
    I see it here now:
    https://github.com/uBlockOrigin/uAssets/pull/24285/commits/f5daf14ab24cd1e6dc51ae3d176b3c04fe6d234b
     
    Last edited: Jun 28, 2024
  13. summerheat

    summerheat Registered Member

    Joined:
    May 16, 2015
    Posts:
    2,244
    It's great that uBO list maintainers added those filters. However, as mentioned in this article it's possible that those domains might also use other TLDs:

    That's why I think more comprehensive filters are advisable. And uBO offers them by using, e.g, this syntax:

    Code:
    ||bootcss.*^$all
    While that wiki entry refers only to static extended filters I found that they also work for above "simple" filters. For example, I block Facebook with this filter:

    Code:
    ||facebook.*^$all
    When opening facebook.com or facebook.net or facebook.org or whatever the site is strictly blocked by uBO due to the filter "||facebook.$document" as found in MyFilters. The entity expressed by the asterisk is one of those listed here.

    You might even add the important filter option which would ignore all exception filters:

    Code:
    ||bootcss.*^$all,important
    EDIT: so the complete set of modified filters would look like this:

    Code:
    ! https://github.com/uBlockOrigin/uAssets/pull/24285/commits/f5daf14ab24cd1e6dc51ae3d176b3c04fe6d234b
    ||polyfill.*^$all,important
    ||googie-anaiytics.*^$all,important
    ||bootcdn.*^$all,important
    ||bootcss.*^$all,important
    ||staticfile.*^$all,important
    ||staticfile.*^$all,important
    ||unionadjs.*^$all,important
    ||xhsbpza.*^$all,important
    ||union.macoms.*^$all,important
    ||newcrbpc.*^$all,important
     
    Last edited: Jun 29, 2024
  14. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,921
    @summerheat

    I don't understand two things from your post
    Code:
    ! https://github.com/uBlockOrigin/uAssets/pull/24285/commits/f5daf14ab24cd1e6dc51ae3d176b3c04fe6d234b
    ||polyfill.*^$all,important
    ||googie-anaiytics.*^$all,important
    ||bootcdn.*^$all,important
    ||bootcss.*^$all,important
    ||staticfile.*^$all,important
    ||staticfile.*^$all,important
    ||unionadjs.*^$all,important
    ||xhsbpza.*^$all,important
    ||union.macoms.*^$all,important
    ||newcrbpc.*^$all,important
    
    1.
    This part:
    Code:
    ||googie-anaiytics.*^$all,important
    
    Original the BleepingComputer article
    https://www.bleepingcomputer.com/ne...-been-defamed-returns-after-domain-shut-down/
    was saying
    Now it seems suddenly to be
    google and googie are different! (forget about those brackets)
    Is there somewhere a typo made, and where? And if so: was it corrected and where and when and by who?

    2.
    You say:
    Code:
    ||staticfile.*^$all,important
    ||staticfile.*^$all,important
    
    Those two lines look to me similar. Am I right?
    I see at https://github.com/uBlockOrigin/uAssets/pull/24285/commits/f5daf14ab24cd1e6dc51ae3d176b3c04fe6d234b
    But nevertheless my question: why those two similar lines?

    TIA
     
  15. summerheat

    summerheat Registered Member

    Joined:
    May 16, 2015
    Posts:
    2,244
    Hi @FanJ

    Well, I took the entries from the commit for uBO filterlist. But it may be prudent to add the other entry as well. :thumb:

    Actually, they are identical. I simply forgot to remove the second one after substituting the TLD with the astrisk. My bad! Thanks for that hint! :)

    EDIT. So the corrected list is:

    Code:
    ! https://github.com/uBlockOrigin/uAssets/pull/24285/commits/f5daf14ab24cd1e6dc51ae3d176b3c04fe6d234b
    ||polyfill.*^$all,important
    ||googie-anaiytics.*^$all,important
    ||google-anaiytics.*^$all,important
    ||bootcdn.*^$all,important
    ||bootcss.*^$all,important
    ||staticfile.*^$all,important
    ||unionadjs.*^$all,important
    ||xhsbpza.*^$all,important
    ||union.macoms.*^$all,important
    ||newcrbpc.*^$all,important
     
  16. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,921
    Hi @summerheat,

    Thanks for your reply and your new list :thumb:

    Cheers!
     
  17. summerheat

    summerheat Registered Member

    Joined:
    May 16, 2015
    Posts:
    2,244
    You're welcome! I'd like to add that using uBO in medium or hard mode is actuallly an even better protection as it also covers (potentially malicious) domains which haven't landed in the filterlists yet.
     
  18. FanJ

    FanJ Updates Team

    Joined:
    Feb 9, 2002
    Posts:
    4,921
    Censys - July 2, 2024
    July 2: Polyfill.io Supply Chain Attack – Digging into the Web of Compromised Domains
    https://censys.com/july-2-polyfill-...-digging-into-the-web-of-compromised-domains/

    Long article. Read there more.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.