Millions of sites could've been exposed in the Polyfill, BootCDN, Bootcss, and Staticfile attack - and it was all orchestrated by a single operator
Briefly

The concerns are that any website embedding a link to the original polyfill.io domain, will now be relying on Funnull to maintain and secure the underlying project to avoid the risk of a supply chain attack, Cloudflare's Sven Sauleau and Michael Tremante explained.
Such an attack would occur if the underlying third party is compromised or alters the code being served to end users in nefarious ways, causing, by consequence, all websites using the tool to be compromised.
Concerns materialized on 25 June when threat intelligence network Sansec claimed the new Chinese owner of the Polyfill project was injecting malicious code into over 100,000 websites.
Read at ITPro
[
|
]