Query Details
// KQL to detect if Polyfill malicious payload was loaded // https://www.linkedin.com/posts/activity-7211650346522173440-988L/ // Polyfill supply chain attack hits 100K+ sites.The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. // KQL to detect if Polyfill malicious payload was loaded. DeviceNetworkEvents | where ActionType == @"HttpConnectionInspected" | extend ConnectInfo = todynamic(AdditionalFields) | extend HttpHost = ConnectInfo.host | where HttpHost contains "googie-anaiytics.com" or HttpHost contains "kuurza.com"
This KQL (Kusto Query Language) query is designed to detect if a malicious payload associated with the Polyfill supply chain attack was loaded on a device. Here's a simple summary of what the query does:
DeviceNetworkEvents).HttpConnectionInspected.AdditionalFields column and stores it in a new column called ConnectInfo.HttpHost.HttpHost contains either "googie-anaiytics.com" or "kuurza.com", which are indicators of the malicious payload.In essence, this query is looking for network connections to specific suspicious domains that are known to be associated with the Polyfill supply chain attack.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators