Re-block Staticfile and BootCDN

This commit is contained in:
SukkaW 2024-07-25 18:11:32 +08:00
parent 187593ecb4
commit 6c54f92d7d
3 changed files with 11 additions and 5 deletions

View File

@ -71,6 +71,11 @@ const REDIRECT_MIRROR = [
['cdn.polyfill.io/', 'https://cdnjs.cloudflare.com/polyfill/'],
['fastly-polyfill.io/', 'https://cdnjs.cloudflare.com/polyfill/'],
['fastly-polyfill.net/', 'https://cdnjs.cloudflare.com/polyfill/'],
// BootCDN has been controlled by a malicious actor and being used to spread malware
['cdn.bootcdn.net/', 'https://cdnjs.cloudflare.com/ajax/libs/'],
['cdn.bootcdn.com/', 'https://cdnjs.cloudflare.com/ajax/libs/'],
['cdn.staticfile.net/', 'https://cdnjs.cloudflare.com/ajax/libs/'],
['cdn.staticfile.org/', 'https://cdnjs.cloudflare.com/ajax/libs/'],
// Misc
['pics.javbus.com/', 'https://i0.wp.com/pics.javbus.com/'],
['googlefonts.wp-china-yes.net/', 'https://fonts.googleapis.com/'],

View File

@ -257,10 +257,5 @@ export const PREDEFINED_WHITELIST = [
// yet stupid AdGuardDNSFilter blocks all of it. Stupid AdGuard
'.w3s.link', // stupid phishing.army, introduce both "*.ipfs.w3s.link" and ".w3s.link" to the block list
'ipfs.io', // ipfs.io was blocked by DigitalSide Threat-Intel - OSINT Hub
// stupid uBlock Origin blocking public cdn
'.bootcdn.net',
'.bootcss.com',
'.staticfile.net',
'.staticfile.org',
'.r2.dev' // Despite 5000+ r2 instances used for phishing, yet cloudflare refuse to do anything. we have no choice but whitelist this.
];

View File

@ -74,6 +74,12 @@ optimus-ads.amap.com
# https://sansec.io/research/polyfill-supply-chain-attack
# https://www.bleepingcomputer.com/news/security/polyfillio-javascript-supply-chain-attack-impacts-over-100k-sites/
.polyfill.io
# Other Public CDN also infected by the same company
.staticfile.org
.staticfile.net
.bootcss.com
.bootcdn.net
.bootcdn.cn
# Rest of Malware / Scam
.hubside.fr