Supply chain, Phishing, Threat Intelligence

Massive copycat gambling site network leveraged in Polyfill supply chain attack

Share

Nearly 40,000 websites spoofing online gambling and casino brands, most of which are in the Chinese language, have been leveraged by Chinese company Funnull as part of the massive digital supply chain attack involving the open-source JavaScript library-hosting domain Polyfill.ioTechCrunch reports.

Attacks by Funnull exploited Polyfill.io access to facilitate malware compromise and redirection to the websites, which impersonate casino conglomerate Sands and the Bwin and Bet365 gambling portals, according to a report from Silent Push researchers. All of the websites were discovered to be hosted on the content delivery network of Funnull purporting to be created in the U.S. but including false office addresses in the U.S., Canada, Singapore, Malaysia, Switzerland, and the Philippines. "It appears likely that this 'online gambling network' is a front," said Silent Push senior threat analyst Zach Edwards, who noted Funnull to be leading "one of the largest online gambling rings." While Bwin parent firm Entain denied ownership of the spoofed domain, other organizations implicated in the supply chain attack campaign have yet to comment.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.