Beware of outside Javascript 3/31/15
Be choosy about what third-party Javascript you include on your site, because each is a potential security risk. The wrong script might even turn your visitors into unwilling attack bots:
China is using their active and passive network infrastructure in order to perform a man-on-the-side attack against GitHub. (…)
- An innocent user is browsing the internet from outside China.
- One website the user visits loads a javascript from a server in China, for example the Badiu Analytics script that often is used by web admins to track visitor statistics (much like Google Analytics).
- The web browser’s request for the Baidu javascript is detected by the Chinese passive infrastructure as it enters China.
- A fake response is sent out from within China instead of the actual Baidu Analytics script. This fake response is a malicious javascript that tells the user’s browser to continuously reload two specific pages on GitHub.com.
While this particular attack from China is extraordinary1, a more mundane hack of your favorite social network might turn a cool share button against you and your users.
-
This attack on Github looks like follow-up to the DNS poisoning attack I wrote about in January. ↩