Potentially millions of users
A significant software supply-chain attack targeted AppsFlyer, a leading marketing analytics firm whose tools are used by over 100,000 applications and websites. On March 14, 2026, it was reported that the company's official Web SDK, hosted at websdk.appsflyer.com, had been temporarily hijacked. Attackers replaced the legitimate JavaScript SDK with a malicious version designed to steal cryptocurrency. The malicious script would automatically activate on any website that loaded the compromised SDK. When an end-user on one of these sites attempted to copy a cryptocurrency wallet address, the script would intercept the clipboard action and replace the legitimate address with one belonging to the attackers. AppsFlyer attributed the compromise to a 'domain registrar incident' on March 10 and has since secured the domain and restored the legitimate SDK. This incident is a classic example of a T1195.002 - Compromise Software Supply Chain: Compromise Software Distribution attack, demonstrating how a single compromise can affect thousands of downstream victims.
websdk.appsflyer.com to an attacker-controlled server.The malware's functionality is known as 'clippering' or clipboard hijacking. Here's how it worked:
<script src="https://websdk.appsflyer.com/...">).This is a stealthy form of theft as the user interface of the webpage appears normal, and many users do not double-check the pasted address before confirming a transaction.
The primary victims of this attack were the end-users of the websites that integrated the AppsFlyer SDK. The financial losses depend on how many users performed cryptocurrency transactions during the compromise window. For AppsFlyer's customers (the websites), the impact is reputational damage and potential loss of user trust. For AppsFlyer itself, the incident is a major security failure that undermines trust in its platform, even though its core systems were not breached. It highlights the critical responsibility of SaaS providers to secure not just their applications, but their entire delivery infrastructure, including DNS.
Detecting this as a downstream victim (a website using the SDK) is very difficult.
<script src="..." integrity="sha256-Abc123...">. If the content of the script ever changes (as it did in this attack), the hash will not match, and the browser will refuse to execute it. This would have completely blocked the attack.While not directly code signing, using Subresource Integrity (SRI) provides a similar guarantee of file integrity for web resources.
For AppsFlyer, securing their domain registrar account with MFA and locks is analogous to hardening a critical directory service.
Websites using the SDK could have mitigated the impact by implementing Subresource Integrity (SRI) to block the modified script.
The AppsFlyer SDK attack is the quintessential use case for Subresource Integrity (SRI). This is a browser security feature that completely prevents the loading of compromised third-party resources. To implement this defense, when a developer includes a third-party script like AppsFlyer's, they must also include a cryptographic hash of the legitimate file's content within the script tag (e.g., integrity="sha384-..."). When a user's browser attempts to fetch the script, it calculates the hash of the received file and compares it to the hash in the HTML. In this attack, since the attackers replaced the script, the hashes would not match. The browser would then refuse to execute the malicious script, completely neutralizing the threat for that user. All organizations that load any third-party JavaScript, CSS, or font files must make SRI a mandatory part of their development lifecycle. It is the most direct and effective countermeasure against this type of supply-chain attack.
For AppsFlyer, the provider whose infrastructure was compromised, preventing future incidents requires robust security at the domain management level. A key defense is using a high-security domain registrar that offers features like Registry Lock. This is a manual, human-in-the-loop process required to make any changes to DNS records, effectively preventing unauthorized modifications even if an account is compromised. Additionally, deploying DNSSEC (Domain Name System Security Extensions) adds a layer of cryptographic verification to DNS lookups, ensuring that users are connecting to the authentic server. For end-user organizations, while less direct, using a DNS security service that can detect and block connections to newly compromised or malicious domains can provide a layer of protection if other defenses fail.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats