malicious javascript injected into 100,000 websites

Low Level Learning
28 Jun 202412:28

Summary

TLDRThe video discusses a critical supply chain attack known as 'Polyfill' or 'Poly Kill', affecting over 100,000 websites. It delves into how the polyfill.io library, essential for modern JavaScript compatibility in older browsers, was compromised by a Chinese company. The attack involved injecting obfuscated code into the library, potentially exploiting browser vulnerabilities to execute malicious code on users' computers. The video raises concerns about the security of widely-used software components and the implications for the future of open-source and third-party code reliance.

Takeaways

  • 🔒 Supply chain security is often overlooked, yet vulnerabilities can have widespread impacts across the internet.
  • 🌐 The 'polyfill' or 'poly kill' attack affected over 100,000 websites and is an ongoing issue.
  • 🛠️ Polyfilling is a technique used to enable modern JavaScript features in older browsers, ensuring compatibility.
  • 📚 CDNs or Content Delivery Networks are relied upon to host and serve code for websites, making them a potential point of exploitation.
  • 🚫 A vulnerability in the polyfill library was posted on GitHub and suspiciously removed, raising concerns about its nature.
  • 🏢 The polyfill.io domain was acquired by a Chinese company, which has been serving a compromised version of the polyfill library.
  • 🤔 The compromised polyfill included obfuscated code that redirected to a fake 'Googy analytics', a variant of the legitimate Google Analytics.
  • 🛑 The JavaScript served from the compromised CDN may contain browser exploits designed to escape the V8 sandbox and execute malicious code.
  • 🔮 Browser exploits take advantage of vulnerabilities in JavaScript engines, like V8, to perform memory corruption and gain unauthorized access.
  • 🗣️ There is ongoing speculation and investigation into the exact nature and purpose of the JavaScript code served by the compromised CDN.
  • 📡 The acquisition of the polyfill.io domain and the subsequent serving of potentially malicious JavaScript raises questions about the security of open-source and third-party code dependencies.

Q & A

  • What is the primary focus of the video script?

    -The primary focus of the video script is on supply chain security, specifically discussing a supply chain attack called polyfill or poly kill that affected over 100,000 websites.

  • Why is supply chain security often overlooked?

    -Supply chain security is often overlooked because people tend to trust the origin of their software and run it without much scrutiny, not realizing that supply chain vulnerabilities can have widespread impacts.

  • What is polyfill, and why was it significant in older browsers?

    -Polyfill is a library used to inject modern JavaScript features into older browsers that do not support them, ensuring that all browsers have a consistent level of functionality.

  • How did the polyfill attack occur?

    -The polyfill attack occurred when a Chinese company acquired the polyfill.io domain and injected obfuscated, malicious JavaScript code into the polyfill library, which then got executed on users' browsers.

  • What is V8, and why is it important in this context?

    -V8 is an open-source, high-performance JavaScript and WebAssembly engine written in C++. It is important because it interprets and runs JavaScript code in the browser, and vulnerabilities in V8 can be exploited to gain control over the user's computer.

  • Why did the issue with polyfill raise suspicions when a vulnerability was reported?

    -Suspicion arose because a reported vulnerability in the polyfill library was immediately deleted off GitHub, and the domain had been recently acquired by a Chinese company, which later served malicious code through the library.

  • What role do CDNs (Content Delivery Networks) play in this attack?

    -CDNs host JavaScript code for websites to pull down and execute. In this attack, the compromised polyfill library was served through a CDN, which allowed the malicious code to be widely distributed to many websites.

  • What is Googy analytics, and how was it used in this attack?

    -Googy analytics is a spoofed version of Google Analytics, used in the attack to deceive users and deliver malicious JavaScript code that could exploit browsers.

  • What does the obfuscated JavaScript code in the polyfill attack do?

    -The obfuscated JavaScript code in the polyfill attack was designed to load malicious scripts, potentially leading to memory corruption vulnerabilities and allowing attackers to gain execution on the remote host computer.

  • Why is the polyfill attack considered particularly dangerous?

    -The polyfill attack is considered dangerous because it can affect hundreds of thousands of websites, allowing attackers to exploit browsers on a massive scale without requiring users to download or install anything manually.

Outlines

00:00

🔒 Supply Chain Security and the Polyfill Attack

This paragraph discusses the critical yet often overlooked issue of supply chain security, particularly focusing on a supply chain attack known as 'polyfill' or 'poly kill' that affected over 100,000 websites. The speaker, with over 10 years of experience in offensive security, introduces the topic by highlighting the widespread nature of supply chain vulnerabilities and their potential to impact the entire internet. The attack in question involved a library called 'polyfill,' which was used to ensure modern JavaScript functionality across older browsers. The polyfill library was hosted on a website called 'polyfill.io,' which was later acquired by a Chinese company. This acquisition led to the insertion of obfuscated code into the library, which, when loaded, would reach out to a disguised 'Googy analytics' instead of the legitimate 'Google analytics,' potentially serving as a vector for browser exploits. The speaker emphasizes the gravity of the situation and the need for greater awareness of supply chain security.

05:00

🕵️‍♂️ The Polyfill.io Incident: Browser Exploitation and CDN Issues

The second paragraph delves deeper into the technical aspects of the polyfill.io incident, explaining the role of JavaScript engines like V8 in browser security. The speaker clarifies that V8, an open-source JavaScript engine written in C++, is susceptible to memory corruption vulnerabilities, which can be exploited through JavaScript to escape the sandbox and execute code on the user's machine. The paragraph describes how the polyfill.io domain, under new ownership, may have served malicious JavaScript through a compromised CDN, potentially affecting hundreds of thousands of websites that relied on it. The speaker also touches on the company's attempts to cover their tracks, including disputes with Cloudflare over the unauthorized use of their name and the company's defiant stance on Twitter. This section underscores the complexity and severity of supply chain attacks in the context of web security.

10:02

🌐 The Future of Supply Chain Security and Open Source Integrity

The final paragraph wraps up the discussion by reflecting on the implications of the polyfill.io incident for supply chain security and the integrity of open-source software. The speaker expresses concern over the increasing frequency of attacks on widely used libraries and the potential consequences for software that relies on third-party code. Mentioning previous incidents like the SolarWinds attack and the XZ backdoor, the speaker raises questions about the future of trust in open-source projects and the responsibility of developers and users to ensure the security of the software supply chain. The paragraph concludes with a recommendation for those interested in learning more about browser exploitation and a call to action for viewers to engage with the content by liking, subscribing, and exploring related videos on the channel.

Mindmap

Keywords

💡Supply Chain Security

Supply chain security refers to the protection of the entire flow of a product or service from the initial producer to the final consumer. In the context of the video, it specifically addresses the security of software supply chains, which is critical because vulnerabilities can affect a vast number of users. The script discusses how an attack on the supply chain can compromise numerous websites and users, as seen with the 'polyfill' or 'poly kill' incident.

💡Polyfill

A polyfill is a piece of code (or plugin) used to provide the technology and functionality of newer browsers to older ones, ensuring consistent behavior across different environments. The video script explains that the polyfill library was compromised, leading to a widespread security incident affecting over 100,000 websites. The term 'polyfill' is central to understanding the nature of the attack discussed in the video.

💡Vulnerability

In the context of cybersecurity, a vulnerability is a weakness in a system that can be exploited by a threat actor. The script mentions a potential vulnerability in the polyfill library that was posted and then quickly deleted from GitHub, sparking suspicion and leading to the discovery of the supply chain attack.

💡CDN (Content Delivery Network)

A CDN is a system of distributed servers that deliver web content to users based on their geographic location. In the video, it is explained that websites often depend on CDNs to host and serve JavaScript code, which can include libraries like polyfill. The compromise of the polyfill.io domain, which was serving as a CDN, is a critical part of the attack story.

💡Obfuscated Code

Obfuscated code is source code that has been modified to be difficult to understand. In the script, it is mentioned that the compromised polyfill library included obfuscated functions, which were used to disguise the malicious intent of the code and make it harder to detect and reverse engineer.

💡Browser Exploits

Browser exploits are methods used to take advantage of vulnerabilities in web browsers to execute malicious code. The video discusses how the compromised polyfill library could potentially be used to exploit browser vulnerabilities, specifically mentioning the JavaScript engine V8, to gain unauthorized code execution.

💡V8

V8 is an open-source JavaScript and WebAssembly engine used in the Google Chrome browser. It is written in C++ and is responsible for interpreting and running JavaScript code. The script explains that exploits can target vulnerabilities in V8 to escape the sandbox and execute code on the user's machine, which is a significant aspect of the polyfill attack.

💡Malicious CDN

A malicious CDN is a content delivery network that has been compromised to distribute harmful code or content. The video describes how the polyfill.io domain, after being acquired by a Chinese company, started serving a compromised version of the polyfill library, effectively turning it into a malicious CDN.

💡Memory Corruption

Memory corruption is a type of software bug that occurs when a program writes data beyond the boundaries of a memory block that has been allocated to it. The script suggests that the exploit in the polyfill library may be using memory corruption vulnerabilities in the V8 engine to gain code execution on the user's computer.

💡Capture the Flag (CTF)

Capture the Flag (CTF) is a cybersecurity competition where participants are challenged to find and exploit vulnerabilities in systems. The video references a CTF challenge involving exploiting V8, illustrating the real-world application of browser exploitation techniques discussed in the script.

💡Sandbox

In computing, a sandbox is a security mechanism for separating running programs to reduce system access from software faults or malicious software. The script mentions the V8 sandbox, which is meant to isolate JavaScript execution to prevent harmful code from affecting the system, but the exploit discussed aims to escape this sandbox.

Highlights

Supply chain security is a critical yet often overlooked aspect of cybersecurity.

Supply chain vulnerabilities can affect the entire internet due to widespread software usage.

The 'polyfill' or 'poly kill' attack impacted over 100,000 websites and is still being addressed.

Polyfilling is a technique to enable modern JavaScript features in older browsers.

CDNs host and serve code, a common practice in web development.

A potential vulnerability in the polyfill library was posted and quickly removed from GitHub, raising suspicions.

The polyfill.io domain was acquired by a Chinese company, leading to concerns about the integrity of the served library.

The compromised polyfill library included obfuscated code that potentially exploited browser vulnerabilities.

The attack involved serving a modified version of Google Analytics ('Googy analytics') through the compromised CDN.

Browser exploits can take advantage of JavaScript engine vulnerabilities to escape sandboxing and execute malicious code.

The polyfill.io incident suggests a mass exploitation campaign affecting many websites.

Cloudflare denied giving authorization to polyfill.io to use their name, indicating a potential misrepresentation.

The company behind polyfill.io has shown resistance to addressing the concerns raised by Cloudflare.

The speaker recommends following experts in browser exploitation for deeper insights into such security issues.

The video discusses the broader implications for supply chain security, including the SolarWinds and XZ backdoor incidents.

The speaker encourages viewers to explore the topic further and watch related videos for more information.

Transcripts

play00:00

supply chain security is an interesting

play00:02

topic of security research the reason

play00:04

being a lot of people don't pay a lot of

play00:05

attention to it you kind of just trust

play00:07

where your software comes from and run

play00:09

it without a ton of issue but the

play00:11

problem with this is that supply chain

play00:12

vulnerabilities are so widespread that

play00:15

when an attack happens they typically

play00:17

affect the entire internet like hundreds

play00:19

of thousands of places because of how

play00:21

widespread the software that we all use

play00:24

is in this video we're talking about a

play00:25

supply chain attack that affected over

play00:28

100,000 weap sites and is still actively

play00:31

being worked out right now the attack is

play00:33

called polyfill or now referred to as

play00:35

poly kill and in this video we'll go

play00:37

into kind of the nature of what polyfill

play00:39

was the way that supply chain attacks

play00:41

typically work out how this supply chain

play00:43

attack in particular worked out and how

play00:45

browser exploits happen now I've been in

play00:47

the offensive security the security

play00:49

research Community for over 10 years and

play00:51

this is hands down one of the craziest

play00:54

exploits that I've seen now if you're

play00:55

new here hi my name is Ed this is Ol

play00:57

learning a channel where I make videos

play00:59

about software security cyber security

play01:01

and a bunch of other stuff so if you

play01:02

like that or just want to hang out hit

play01:03

that sub button I really appreciate it

play01:05

now all of the supply chain issue boils

play01:07

down to this Library called polyfill and

play01:10

it was hosted at one point on this

play01:11

website called polyfill.io now if you

play01:14

don't know what poly filling is I didn't

play01:15

until recently I'm not a web guy poly

play01:17

filling is a way that back in the day we

play01:20

were able to use modern JavaScript on

play01:23

Old browsers right so there were

play01:25

browsers like ie7 and older versions of

play01:28

Firefox that really didn't have like a

play01:30

lot of support for modern JavaScript

play01:32

features and there is this Library

play01:34

called polyfill that you're able to use

play01:36

to effectively inject the features into

play01:38

the browser so that the browsers were

play01:40

all at the same level now as my buddy

play01:42

Theo indicated I didn't realize this

play01:44

when Chrome came about Chrome kind of

play01:45

set the bar for the Baseline JavaScript

play01:48

requirements uh for browser so polyfill

play01:50

is really no longer required but a lot

play01:52

of websites still depend on it and like

play01:54

any website typically when you write

play01:56

JavaScript you don't write the

play01:58

JavaScript yourself you don't write all

play02:00

the code you depend on these things

play02:01

called cdns or content delivery networks

play02:03

and what they do is they host the code

play02:05

for you so you can just go pull them

play02:06

down when you go to the website and even

play02:08

right now when I go to mdn web docs if I

play02:11

go to my network Tab and hit refresh

play02:12

you'll probably see that I'm downloading

play02:14

a ton of other JavaScript files that are

play02:17

used to run this website right so it's

play02:19

not entirely uncommon that this happens

play02:21

now the issue is that recently and but

play02:24

recently it was actually about a month

play02:25

ago there is an issue where somebody

play02:27

posted a potential vulnerability in the

play02:30

poil library and it was immediately

play02:33

deleted off of GitHub very suspicious so

play02:35

people are trying to figure out okay why

play02:37

was this deleted it turns out that the

play02:41

polyfill.io domain that was not

play02:43

originally owned or maintained by the

play02:46

Pol library maintainer was acquired by a

play02:49

Chinese company now what they did is

play02:52

extremely interesting so again just like

play02:55

any other JavaScript website what you'll

play02:56

do is if you want to depend on the poly

play02:59

full Library you will just literally put

play03:01

a remote script Source link into your

play03:03

code to pull out this JavaScript right

play03:05

so the compromise URL is this Library

play03:07

here and actually I think name sheep the

play03:08

owner of the polyfill.io domain does not

play03:11

serve this IP address right now so

play03:13

you'll see the CDN doesn't work but so

play03:15

what happens is that you go and pull

play03:16

down this library and that code gets put

play03:18

into your browser and gives you the

play03:20

features of polyfill which again is just

play03:21

meant to make sure that you and all the

play03:23

other browsers are on the same Baseline

play03:25

of functionality so that all in

play03:26

JavaScript works well what's pretty

play03:28

insane is again company bought this no

play03:31

inherent issue with that but when you go

play03:34

and check out or checked out before they

play03:36

pulled this all down the version of

play03:38

polyfill that this website was serving

play03:40

versus other CDN like cloudflare for

play03:42

example a bunch of OB fiscated code was

play03:46

put into the library there were all of

play03:48

these obfuscated functions with random

play03:51

prototypes and and variables that

play03:53

effectively would go out and reach out

play03:55

to not Google analytics Googy analytics

play03:58

and they would pull down G a .js which

play04:01

if this were actually Google analytics

play04:03

it would look like the JavaScript page

play04:04

that a lot of sites depend on to do

play04:06

tracking of users when they're going to

play04:08

websites you want to see how long the

play04:09

browse time was what their clickthrough

play04:10

rate was on certain elements all that

play04:12

stuff all this can be done through

play04:13

Google analytics so if you look at this

play04:15

quick enough you're like what those

play04:16

aren't L's those are I's so Googy

play04:18

analytics gets injected into the

play04:20

polyfill.io polyfill CDN So eventually

play04:24

what happens is they have all this obis

play04:26

skated code someone did the work of kind

play04:27

of reverse engineering what this

play04:28

actually does when poly. min.js gets put

play04:31

into your browser on certain devices

play04:33

polyfill.io will load up Googy analytics

play04:36

ga.js they've pulled down this piece of

play04:39

JavaScript but what it actually ended up

play04:41

being was this paste bin here which is a

play04:43

very another heavily OB fiscated piece

play04:46

of JavaScript code very interesting so

play04:49

the question is what does this piece of

play04:51

JavaScript code do what is happening

play04:53

here this is where I think a lot of

play04:55

speculation is still around there hasn't

play04:57

been a ton of reverse engineering work

play04:58

I'm actively working on taking this

play05:00

apart right now to figure out what it

play05:01

actually is but I have a couple

play05:03

inclinations just on my experience in

play05:05

the security world and reading articles

play05:07

about browser exploitation right so the

play05:10

question kind of becomes why is it bad

play05:13

if an arbitrary user runs JavaScript in

play05:17

your browser right like who cares

play05:18

there's nothing inherently wrong with

play05:20

that the idea being that the JavaScript

play05:22

engine the the V8 sandbox is a Sandbox

play05:25

now if you don't know what V8 is V8 is

play05:27

the open-source high performance JV

play05:29

JavaScript and web assembly engine that

play05:31

is written C++ so what what are we

play05:33

actually getting at here what this thing

play05:34

actually does is if you've ever like

play05:36

used JavaScript right in the browser

play05:38

there has to be somewhere that

play05:40

interprets the code and runs the

play05:42

JavaScript on the CPU that is called

play05:44

your JavaScript engine right so for

play05:46

example if I put ver x equals 0 whatever

play05:49

all of this is being interpreted via an

play05:52

engine that is written in C++ which is

play05:54

known as V8 right and that's how the

play05:56

Chrome backend works I'm pretty sure

play05:58

that Firefox uses V8 again I don't know

play06:00

the ins and outs of all the browsers but

play06:01

I know that no. JS and chrome do use V8

play06:04

now again this is written in C++ which

play06:06

means that it can have any number of

play06:09

memory corruption vulnerabilities that

play06:11

you will find in any other application

play06:14

this is where the world of browser

play06:16

exploitation comes in where you are able

play06:18

to Via JavaScript write exploits that

play06:22

take advantage of known vulnerabilities

play06:24

or potentially zero days in v8's

play06:26

interpretation of C++ and use that to

play06:29

escape the V8 sandbox and get code

play06:32

execution on the remote host computer so

play06:34

wrapping this all up polyfill.io like I

play06:36

said before is ran on hundreds of

play06:39

thousands of websites so what does this

play06:41

mean this means that if you visit a

play06:43

website that is using polyfill and is

play06:45

depending on the polyfill.io CDN or at

play06:48

least PRI prior to the CDN being taken

play06:50

down that you were going to the website

play06:53

the Google the Googy analytics

play06:54

JavaScript page and then from there was

play06:56

potentially serving you JavaScript that

play06:59

was being used to exploit your browser

play07:01

now again we are in pretty much in

play07:02

speculation mode right now but what this

play07:04

looks like to me is a JavaScript exploit

play07:07

that has been OB fiscated so that you

play07:08

can't reverse engineer it that is doing

play07:10

some kind of memory corruption to gain

play07:12

execution in the browser right kind of a

play07:14

crazy thing and from a malicious actor

play07:16

perspective while this is so

play07:17

advantageous is that they don't have to

play07:18

do any work like provided that this

play07:20

exploit is written well and has enough

play07:22

functionality in it what they can

play07:23

literally do is push a malicious update

play07:25

to their CDN and then every user that

play07:28

goes to these websites and loads their

play07:30

version of JavaScript is served this

play07:33

exploit and is used and that JavaScript

play07:35

can be used to potentially escape the

play07:37

v8m get code execution on your computer

play07:39

and then from there they have a mass

play07:41

exploitation campaign so truly insane

play07:43

now what are people saying on Twitter

play07:45

what are people saying what is what is

play07:46

the the the company that bought polyfill

play07:49

saying on Twitter well well well well

play07:52

the company that acquired this again the

play07:55

polyfill.io domain was not actually ran

play07:58

by the person who maintained polyfill

play08:00

right here's one of the reasons that I

play08:01

believe it is truly a malicious campaign

play08:04

and not like a Oopsy Daisy like someone

play08:07

got hacked you know what I mean like

play08:08

it's it's very intentional and the

play08:09

reason being the number of times that

play08:11

polyfill IO tried to cover their tracks

play08:14

so let's go through this so article here

play08:16

bleeping computer cloudflare we never

play08:18

authorized polyfill.io to use our name

play08:20

now so cloudflare if you don't know is a

play08:23

huge cloud provider that does a bunch of

play08:25

stuff for a majority of the internet you

play08:27

can host Services there you can have

play08:28

your domain names hosted there you can

play08:30

do web application filters there you can

play08:32

do load balancers there a whole bunch of

play08:33

stuff one of the things that cloud flare

play08:35

is known for is it is a large content

play08:37

delivery Network which means that

play08:39

instead of going to polyfill.io to Serve

play08:42

Yourself poly. JS there's also a copy

play08:44

hosted on cloudflare so if you went to

play08:47

the polyfill IO a couple days ago before

play08:49

this whole thing went down you would see

play08:51

that there's a little lock sign which

play08:53

means that it's secure obviously and

play08:55

cloudflare security protection is

play08:57

enabled and then you go and you look at

play08:59

this and you're seeing that polyfill.io

play09:00

is actually the URL and it's not the

play09:03

cloudflare CDN so either polyfill.io is

play09:07

a cname you know a name lookup on a DNS

play09:09

record for a cloudflare domain or poell

play09:13

is trying to say that our code is backed

play09:16

by the cloudflare CDN they're a third

play09:18

party so you can trust us cuz we're cool

play09:20

right and so what cloud flare

play09:21

effectively says in this article is that

play09:23

cloudflare never recommended to

play09:26

polyfill.io that they were allowed to

play09:27

use our name on their website we asked

play09:30

them to remove the false statement and

play09:31

they have so far ignored our requests

play09:33

and because Nam sheep is now not serving

play09:35

the polyfill.io domain name you can't

play09:38

really confirm or deny this but it's

play09:40

it's in the pictures and so even further

play09:42

poil has doubled down on Twitter and

play09:45

said I have had enough of cloud Flair's

play09:48

repeated baseless and malicious

play09:50

definition I don't know man first of all

play09:52

not really baseless this is like you

play09:53

actively gaslighting the entire internet

play09:55

moving forward I be fully dedicated to

play09:57

developing a global CDM product that

play10:00

surpasses Cloud flare showcasing the

play10:02

true power of capital I don't know what

play10:04

the that means again that bought by

play10:06

a Chinese company serving malicious

play10:07

JavaScript this reads to me like

play10:10

somebody who wrote a very flowery

play10:11

paragraph in Mandarin and put it into

play10:14

Google translate but I digest I have

play10:16

already secured 50 million startup

play10:18

funding the product okay so effectively

play10:19

what he says and note that he put this

play10:21

giant image in the Twitter polyfill.io

play10:22

is going to attempt to be their own CDN

play10:25

because they're mad at Cloud flare for

play10:26

telling them to stop hosting malicious

play10:28

JavaScript uh pretty crazy situation and

play10:31

if you can go to their account you can

play10:32

tell it's fairly new because they have

play10:33

like 40 followers again like if you want

play10:35

to follow them I guess fine but no this

play10:37

is likely a malicious CDN account uh and

play10:40

literally all their posts are about them

play10:42

getting slander on the internet for I

play10:44

will repeat myself posting malware on

play10:46

the internet yeah so kind of a wild

play10:48

place to be in now if any of this

play10:50

interests you if you want to go learn

play10:52

about the world of browser exploitation

play10:54

like how to find or write exploits that

play10:56

attack a browser just know how they

play10:57

actually work reban 01 who is someone

play11:00

that I follow on Twitter I recommend

play11:01

that you go follow them as well uh

play11:03

posted a really really cool write up

play11:04

from a CTF capture the flag called

play11:06

exploiting V8 at open ecsc basically

play11:09

there was a capture the flag challenge

play11:11

that they were supposed to exploit a

play11:13

chrome CBE one of them was in an

play11:15

implementation of array. exor in

play11:17

JavaScript and here's the code diff and

play11:19

again like I said before the V8 engine

play11:21

is just C++ that you run that interprets

play11:24

JavaScript right so this whole write up

play11:26

is their adventure of finding out how to

play11:29

AR ray. xor produce a memory corruption

play11:31

vulnerability and then using that to pop

play11:33

bsh and get a shell on the computer that

play11:35

is running Chrome so really great right

play11:37

up but yeah supply chain security is

play11:39

completely crazy it is a world that I'm

play11:42

really nervous that people are not

play11:43

thinking enough about between the solar

play11:45

winds attack I think in 2020 where a

play11:47

security product got attacked I think by

play11:49

the Russians and then you have the XZ

play11:51

back door where this this widely used uh

play11:54

compression Library gets attacked and

play11:56

now JavaScript cdns are being purchased

play11:58

up by other countries and having codee

play12:01

injected into them it begs a really

play12:03

interesting question about the future of

play12:05

not only open source but just code that

play12:08

people use that they didn't write

play12:10

themselves right so anyway if you

play12:11

thought this video was interesting do me

play12:12

a favor hit that like button hit

play12:13

subscribe and then go check out this

play12:14

other video this other video about uh

play12:17

the XC back door which was really cool

play12:19

it's kind of the same thing only it has

play12:21

to do with a much smaller but much more

play12:24

widely used library that almost had the

play12:26

same fate as this we'll see you there

Rate This

5.0 / 5 (0 votes)

Related Tags
Supply ChainSecurity ResearchWeb SecurityBrowser ExploitsJavaScriptCDN IssuesInternet-wideCyber ThreatVulnerabilityOpen Source