← Supply-Chain Attack Compendium

Twilio TaskRouter JS SDK

Incident Summary

Twilio SDK hosted on S3 delivered malicious code.

An improperly configured AWS S3 bucket allowed attackers to modify version 1.20 of Twilio's TaskRouter JavaScript SDK hosted for public use. For several hours, websites loading the SDK directly from Twilio's CDN received code modified with malicious script, likely part of a Magecart-related malvertising or skimming campaign.

Date
2020-07-19 to 2020-07-20
Category
Commercial
Target Surface
Distribution
Insertion Phase
distribution
Impact
Malvertising
Cause
Cloud storage misconfiguration

What Was Affected

Package Twilio TaskRouter JS SDK
ComponentLibrary
Artifact typesource archive
Domain typeproject download host
Domain twiliocdn.com

Compromised Versions

  • TaskRouter JS SDK v1.20

Incident Context

Motive
Financial gain
Attribution
Cybercriminal group
Transitive
No
Observed Duration
1 days

Evidence

Compromised Artifacts

Current Artifacts and Analysis

External References

Source Data

Source record: proprietary/twilio/meta.yaml