Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean Hackers Linked to Massive Polyfill Attack

North Korean Hackers Linked to Massive Polyfill Attack

Posted on March 12, 2026 By CWS

The recent revelations have connected a widespread supply chain attack on over 100,000 websites to North Korean cyber operatives. Initially, the breach, which involved the Polyfill.io service, was thought to be orchestrated by Chinese actors. However, new evidence points to a more complex collaboration involving North Korean hackers.

Background of the Polyfill Attack

In early 2024, Polyfill.io, a service relied upon by numerous websites for delivering JavaScript code to ensure browser compatibility, was acquired by the Chinese content delivery network company Funnull. Not long after the acquisition, malicious JavaScript began appearing in the scripts distributed from the cdn.polyfill.io domain.

The injected code was specifically designed to target mobile users, employing evasion tactics and redirecting them to illicit betting and adult websites. This malicious activity was confirmed by security experts from Sansec and C/side by mid-2024. As a result, there was an urgent call for website administrators to eliminate links to the compromised Polyfill domain to prevent further security breaches.

Uncovering North Korean Involvement

Despite initial assumptions pointing to a Chinese operation, the cybersecurity firm Hudson Rock uncovered new information suggesting otherwise. Their investigations, which focus on intelligence from infostealer malware, revealed that Funnull might have been a facade for deeper involvement by North Korean threat actors.

Hudson Rock tracked data exfiltrated from devices compromised by infostealers, including one linked to North Korean hackers. This data included a fake software installer that deployed LummaC2 malware, which was capable of harvesting credentials and browser data from affected devices. This evidence provided a direct link between the North Korean operators and the Chinese syndicate controlling Polyfill’s malicious activities.

Implications of the Attack

The stolen data from the North Korean hacker’s device disclosed critical information, such as credentials for managing Funnull’s DNS and access to Polyfill’s Cloudflare settings. This confirmed the attackers’ influence over the domain used in the widespread attack.

Hudson Rock highlighted that the ultimate objective of the Polyfill attack was to direct users to gambling sites affiliated with Suncity Group, a China-based company. This operation served as a mechanism to funnel substantial amounts of cryptocurrency back to North Korea, further emphasizing the scale and sophistication of the attack.

In a broader context, North Korean hackers have reportedly accumulated over $2 billion in cryptocurrency by 2025, showcasing their persistent threat to global financial systems.

The infostealer malware also unveiled another scheme where a North Korean agent infiltrated a cryptocurrency exchange to gain insights into anti-money laundering procedures. Such operations underline the ongoing challenges in combating cyber threats from state-sponsored actors.

As the investigation continues, these findings underscore the critical need for enhanced cybersecurity measures and international cooperation to thwart similar attacks in the future.

Security Week News Tags:browser compatibility, Cryptocurrency, Cybersecurity, Funnull, Hudson Rock, InfoStealer, JavaScript, Malware, North Korea, Polyfill, security firms, Suncity Group, supply chain attack

Post navigation

Previous Post: Microsoft OAuth Device Phishing Threat Escalates
Next Post: Critical SolarWinds Vulnerability Demands Immediate Action

Related Posts

Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 Radware Says Recently Disclosed WAF Bypasses Were Patched in 2023 Security Week News
North Korea’s Fake Recruiters Feed Stolen Data to IT Workers North Korea’s Fake Recruiters Feed Stolen Data to IT Workers Security Week News
Realm.Security Raises  Million in Series A Funding Realm.Security Raises $15 Million in Series A Funding Security Week News
Honoring Our Veteran Readers: Thank You for Your Service Honoring Our Veteran Readers: Thank You for Your Service Security Week News
Spanish Airline Iberia Notifies Customers of Data Breach Spanish Airline Iberia Notifies Customers of Data Breach Security Week News
ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics
  • Rust-Based VENON Malware Targets Brazilian Banks
  • Critical SolarWinds Vulnerability Demands Immediate Action
  • North Korean Hackers Linked to Massive Polyfill Attack
  • Microsoft OAuth Device Phishing Threat Escalates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Powered Slopoly Malware Boosts Hive0163’s Ransomware Tactics
  • Rust-Based VENON Malware Targets Brazilian Banks
  • Critical SolarWinds Vulnerability Demands Immediate Action
  • North Korean Hackers Linked to Massive Polyfill Attack
  • Microsoft OAuth Device Phishing Threat Escalates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News