RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Product & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityJune 28, 2024

The Polyfill.io vulnerability: Software supply chain attack lessons

The compromise of the widely used Polyfill.io CDN contains important lessons for organizations on trust.

smiling woman with glasses
Carolynn van Arsdale, Writer, ReversingLabs.Carolynn van Arsdale
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
polyfill supply chain attack

See RL's Joshua Knox break down the Polyfill.io supply chain attack on YouTube.

The cybersecurity firm Sansec this week disclosed a significant software supply chain attack that leveraged the content delivery network (CDN) Polyfill.io. The CDN, used by a countless number of websites, was pushing out malicious code and redirecting a significant number of Internet users to spam sites.

Polyfill.io was a community-run CDN service that was bought by Funnull, a Chinese company, in February. Researcher Andrew Betts, who originally developed Polyfill (but had no ownership of the domain, nor any say in its sale) shared a message on X (formerly Twitter) in late February stating: “If your website uses Polyfill.io, remove it IMMEDIATELY.” Funnull announced later that month it officially purchased the domain and its associated GitHub account.

Before the ownership change, Polyfill was used by countless sites that run modern code that isn’t supported by outdated web browsers. After Funnull acquired the domain, the CDN’s script was modified to introduce malicious functions, forcing impacted website maintainers to remove cdn.polyfill.io from their scripts. Despite the warnings and subsequent ownership change of the domain months ago, it wasn’t until this past week that the supply chain attack was identified.

Here's what we know about the Polyfill.io software supply chain attack — and key lessons learned.

See RL's new Spectra Assure Community: Free Portal Helps Devs Spot Malicious Open Source Packages

Inside the Polyfill vulnerability: What we know

Sansec warned that the Polyfill.io domain injects malware on mobile devices via any site that embeds the CDN. Indicators of Compromise (IoCs) for the attack also include typosquatted URLs, including one masquerading as Google Analytics.

Joshua Knox, Senior Cybersecurity Technologist and evangelist for ReversingLabs (RL), broke down the anatomy of this attack on the RL YouTube channel, noted in his explanation that the lessons of the Polyfill vulnerability are very similar to those raised by Log4Shell, the infamous Log4j open source vulnerability:

In this case, this cdn.polyfill.io may be something that you're using on your website that you didn’t even know you're using.

Joshua Knox

In the case of Log4j, security teams were scrambling to figure out if they even had the vulnerable version of the open source file in their applications. Now, with Polyfill.io, website maintainers are similarly struggling to figure out if their web scripts are running the cdn.polyfill.io. Malicious activity will continue to occur until maintainers replace or remove the CDN.

Sansec also noted that when they tried to decode a malware sample introduced by Polyfill, they found that the code has specific protections against reverse engineering, and the malicious functions won’t be executed to the impacted device if an admin user is detected.

Next steps: Remediation and lessons learned

On the immediate remediation front, website maintainers are urged to review their scripts are calling on cdn.polyfill.io, and remove them immediately. Leak Signal, a cybersecurity firm, created a website (Polykill.io) that allows users to search for sites that use the impacted CDN —and outlines alternatives for those who need to replace it.

The key takeaway from this latest supply chain attack is that security teams need to be vigilant about all third-party services — trust is key. To understand how this attack unfolded, learn how the attack is unique from other landmark software supply chain attacks — and to learn more lessons — see Joshua Knox’s video breaking it down using RL Spectra Analyze on our YouTube channel:

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

AI agents risk

Claude Mythos: Get your AppSec game on

Anthropic's new AI is a 'step change' for exposing software flaws — but also ramps up exploits. Are you ready for it?

Learn More about Claude Mythos: Get your AppSec game on
Claude Mythos: Get your AppSec game on
28

28 application security stats that matter

AI and open source are redefining the software threat landscape. Here are the key statistics you need to know.

Learn More about 28 application security stats that matter
28 application security stats that matter
axios

Axios: How AppSec teams should respond

Here's a mitigations checklist and best practices. Plus: How RL’s xBOM and Spectra Assure Community can help.

Learn More about Axios: How AppSec teams should respond
Axios: How AppSec teams should respond
Software trust debt

How JPMC tackles software ‘trust debt’

JPMorgan Chase CISO Patrick Opet discussed his letter on third-party software risk — and how that has played out.

Learn More about How JPMC tackles software ‘trust debt’
How JPMC tackles software ‘trust debt’

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top