Keeping our users safe is one of our top priorities, and we sincerely apologize to anyone who was negatively impacted by this event. Once we fully understand the nature of the incident, we will provide an update with additional information. We are currently investigating the root cause. Rest assured that video.js is once again safe to load. The files were repaired at 7:15am PDST and completed propagation to CDN edge caches around the world at 7:51am PDST. It has been determined that the files were originally modified at 4:30am PDST.
INETWORK THAT ONCE HAD VJS INSTALL
Potential Impact: Any browsers that loaded the affected files during the compromised period may have prompted users to install malicious software on their computers. Users who host their own copy of Video.js were also not affected. 4.1.0/video.js) were affected, and neither was the latest version (4.2). We quickly reverted to safe versions of the video.js file, and took steps to ensure that the issue could not reoccur.
![inetwork that once had vjs inetwork that once had vjs](http://files.pressherald.com/uploads/2013/11/85118+20131106Blackwood_1.jpg)
The malware has been identified to be a variant of .1932 or. The file was changed to contain malicious code that would attempt to install malware on any Windows or Macintosh computer that loaded the video.js file. On the morning of Septemat 6:25am PDST, we discovered that certain versions of video.js being served from our content delivery network (CDN) had been modified by an unknown attacker.
![inetwork that once had vjs inetwork that once had vjs](https://www.timeoutdoha.com/public/styles/full_img_sml/public/images/2013/10/30/2013_barrss_3_base.jpg)
The original source of this event was the Sendori Auto-update Hack, which possibly affected millions of people including, unfortunately, an admin of the CDN.
![inetwork that once had vjs inetwork that once had vjs](https://clickamericana.com/wp-content/uploads/VJ-Day-Victory-in-Japan-WWII-at-Click-Americana-1-750x644.jpg)
The CDN continues to be secure and we have taken significant steps to ensure it never falls under a similar attack again. Unauthorized modification of Video.js CDN files