AppsFlyer Web SDK Hijacked in Supply-Chain Attack to Deploy Crypto-Stealing Malware

AppsFlyer Web SDK Supply-Chain Attack Deploys Crypto-Stealing Malware

HIGH
March 15, 2026
5m read
Supply Chain AttackMalwareCyberattack

Impact Scope

People Affected

Potentially millions of users

Affected Companies

AppsFlyer

Industries Affected

TechnologyOther

Related Entities

Organizations

Other

Full Report

Executive Summary

A significant software supply-chain attack targeted AppsFlyer, a leading marketing analytics firm whose tools are used by over 100,000 applications and websites. On March 14, 2026, it was reported that the company's official Web SDK, hosted at websdk.appsflyer.com, had been temporarily hijacked. Attackers replaced the legitimate JavaScript SDK with a malicious version designed to steal cryptocurrency. The malicious script would automatically activate on any website that loaded the compromised SDK. When an end-user on one of these sites attempted to copy a cryptocurrency wallet address, the script would intercept the clipboard action and replace the legitimate address with one belonging to the attackers. AppsFlyer attributed the compromise to a 'domain registrar incident' on March 10 and has since secured the domain and restored the legitimate SDK. This incident is a classic example of a T1195.002 - Compromise Software Supply Chain: Compromise Software Distribution attack, demonstrating how a single compromise can affect thousands of downstream victims.


Threat Overview

  • Target: The AppsFlyer Web SDK, a third-party JavaScript library integrated into thousands of websites for marketing analytics.
  • Attack Vector: The attackers compromised the distribution point of the SDK. AppsFlyer stated this was due to a 'domain registrar incident,' which could imply several scenarios:
    • Compromise of AppsFlyer's account at their domain registrar, allowing attackers to change DNS records.
    • DNS hijacking or BGP hijacking to redirect traffic intended for websdk.appsflyer.com to an attacker-controlled server.
  • Malicious Payload: A JavaScript-based cryptocurrency stealer. It specifically targets clipboard events to perform address swapping.
  • Impact: Any user performing a cryptocurrency transaction on a website using the compromised SDK was at risk of having their funds stolen. The attack was widespread but transient, lasting only for the duration of the hijack.

Technical Analysis

The malware's functionality is known as 'clippering' or clipboard hijacking. Here's how it worked:

  1. A user visits a website that legitimately includes the AppsFlyer SDK (e.g., <script src="https://websdk.appsflyer.com/...">).
  2. Due to the DNS hijack, the browser fetches the malicious JavaScript from an attacker-controlled server instead of the real one.
  3. The malicious script executes in the user's browser and adds an event listener to the webpage.
  4. When the user copies a string that matches the pattern of a cryptocurrency wallet address (e.g., a long alphanumeric string starting with 'bc1', '0x', etc.), the script intercepts the copy event.
  5. It then replaces the content of the user's clipboard with a hardcoded wallet address belonging to the attacker.
  6. When the user pastes the address into their wallet or exchange to send funds, they unknowingly paste the attacker's address, diverting the transaction.

This is a stealthy form of theft as the user interface of the webpage appears normal, and many users do not double-check the pasted address before confirming a transaction.


Impact Assessment

The primary victims of this attack were the end-users of the websites that integrated the AppsFlyer SDK. The financial losses depend on how many users performed cryptocurrency transactions during the compromise window. For AppsFlyer's customers (the websites), the impact is reputational damage and potential loss of user trust. For AppsFlyer itself, the incident is a major security failure that undermines trust in its platform, even though its core systems were not breached. It highlights the critical responsibility of SaaS providers to secure not just their applications, but their entire delivery infrastructure, including DNS.


Detection & Response

Detecting this as a downstream victim (a website using the SDK) is very difficult.

  1. Subresource Integrity (SRI): The most effective defense is to use Subresource Integrity. When including a third-party script, an integrity hash is added to the script tag: <script src="..." integrity="sha256-Abc123...">. If the content of the script ever changes (as it did in this attack), the hash will not match, and the browser will refuse to execute it. This would have completely blocked the attack.
  2. Content Security Policy (CSP): A strict CSP can limit the domains from which scripts can be loaded, but in this case, since the legitimate domain itself was hijacked, a basic CSP would not have helped. However, a more advanced CSP could be used to restrict connections to attacker-controlled wallet APIs if the malware made external calls.
  3. Incident Response: AppsFlyer's response involved regaining control of their domain, replacing the malicious file with the legitimate one, and communicating with customers. Downstream websites should have immediately audited their sites to see if they were loading the SDK and informed their users of the potential risk.

Mitigation

  1. For SaaS Providers (like AppsFlyer):
    • Registrar Lock and 2FA: Secure domain registrar accounts with the highest level of security, including registrar lock (which prevents unauthorized transfers or DNS changes) and multi-factor authentication.
    • DNSSEC: Implement DNSSEC to ensure the integrity of DNS responses and prevent DNS spoofing.
  2. For Websites Using Third-Party Scripts:
    • Implement Subresource Integrity (SRI): This is the single most important mitigation for this attack class. Always generate and use an integrity hash for third-party scripts.
    • Vendor All Your Scripts: A more extreme but secure approach is to host a local copy of all third-party scripts on your own infrastructure. This gives you full control but means you are responsible for manually updating them. This is a form of D3-NI: Network Isolation for your dependencies.

Timeline of Events

1
March 9, 2026
Security researchers at Profero first discover the malicious payload being served.
2
March 10, 2026
AppsFlyer reports a domain registrar incident that exposed the Web SDK to unauthorized code.
3
March 14, 2026
The supply-chain attack is publicly reported by BleepingComputer.
4
March 15, 2026
This article was published

MITRE ATT&CK Mitigations

While not directly code signing, using Subresource Integrity (SRI) provides a similar guarantee of file integrity for web resources.

For AppsFlyer, securing their domain registrar account with MFA and locks is analogous to hardening a critical directory service.

Websites using the SDK could have mitigated the impact by implementing Subresource Integrity (SRI) to block the modified script.

D3FEND Defensive Countermeasures

The AppsFlyer SDK attack is the quintessential use case for Subresource Integrity (SRI). This is a browser security feature that completely prevents the loading of compromised third-party resources. To implement this defense, when a developer includes a third-party script like AppsFlyer's, they must also include a cryptographic hash of the legitimate file's content within the script tag (e.g., integrity="sha384-..."). When a user's browser attempts to fetch the script, it calculates the hash of the received file and compares it to the hash in the HTML. In this attack, since the attackers replaced the script, the hashes would not match. The browser would then refuse to execute the malicious script, completely neutralizing the threat for that user. All organizations that load any third-party JavaScript, CSS, or font files must make SRI a mandatory part of their development lifecycle. It is the most direct and effective countermeasure against this type of supply-chain attack.

For AppsFlyer, the provider whose infrastructure was compromised, preventing future incidents requires robust security at the domain management level. A key defense is using a high-security domain registrar that offers features like Registry Lock. This is a manual, human-in-the-loop process required to make any changes to DNS records, effectively preventing unauthorized modifications even if an account is compromised. Additionally, deploying DNSSEC (Domain Name System Security Extensions) adds a layer of cryptographic verification to DNS lookups, ensuring that users are connecting to the authentic server. For end-user organizations, while less direct, using a DNS security service that can detect and block connections to newly compromised or malicious domains can provide a layer of protection if other defenses fail.

Sources & References

AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code
BleepingComputer (bleepingcomputer.com) March 14, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

JavaScriptCryptocurrencyClipboard HijackingDNS HijackingSubresource Integrity

📢 Share This Article

Help others stay informed about cybersecurity threats