Executive Summary
In March 2026, the AppsFlyer Web SDK, utilized by over 100,000 applications for marketing analytics, was compromised in a supply chain attack. Malicious JavaScript code was injected into the SDK, enabling attackers to intercept and replace cryptocurrency wallet addresses entered by users on affected websites, diverting funds to attacker-controlled wallets. The attack targeted major cryptocurrencies, including Bitcoin, Ethereum, Solana, Ripple, and TRON, potentially impacting a vast number of end users. The incident underscores the critical vulnerabilities inherent in widely deployed third-party SDKs and the significant risks they pose to downstream applications and their users. Organizations relying on such SDKs must implement rigorous security measures and maintain vigilant monitoring to detect and mitigate potential compromises promptly.
Why This Matters Now
This incident highlights the escalating threat of supply chain attacks targeting widely used third-party SDKs, emphasizing the urgent need for organizations to enhance their security protocols and monitoring systems to protect against such vulnerabilities.
Attack Path Analysis
The adversary compromised the AppsFlyer Web SDK, injecting malicious JavaScript to intercept and replace cryptocurrency wallet addresses entered by users, thereby diverting funds to attacker-controlled wallets. This attack unfolded across the six stages of the cloud kill chain, from initial compromise to impact.
Kill Chain Progression
Initial Compromise
Description
The attacker gained unauthorized access to the AppsFlyer Web SDK, possibly through a domain registrar incident, allowing them to inject malicious JavaScript code.
MITRE ATT&CK® Techniques
Compromise Software Supply Chain
JavaScript
Content Injection
HTML Smuggling
Drive-by Compromise
Credentials from Web Browsers
Exfiltration Over C2 Channel
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 6
CISA ZTMM 2.0 – Applications and Workloads
Control ID: Pillar 3
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
AppsFlyer SDK supply chain attack targeting cryptocurrency transactions creates critical exposure through compromised third-party integrations in financial applications and platforms.
Internet
Web-based businesses using AppsFlyer SDK face direct compromise risk from malicious JavaScript injection affecting user cryptocurrency transactions and website security.
Computer Software/Engineering
Software companies integrating AppsFlyer's widely-deployed SDK inherit supply chain vulnerabilities affecting 100,000+ applications with potential for lateral movement and data exfiltration.
Marketing/Advertising/Sales
Marketing platforms leveraging AppsFlyer's mobile measurement partner SDK face operational disruption and client data exposure from compromised third-party analytics infrastructure.
Sources
- AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript codehttps://www.bleepingcomputer.com/news/security/appsflyer-web-sdk-used-to-spread-crypto-stealer-javascript-code/Verified
- Hijacked at the Source: A Trusted Marketing AppsFlyer’s SDK distributes a Crypto Stealerhttps://profero.io/blog/hijacked-at-the-source-a-trusted-marketing-appsflyers-sdk-distributes-a-crypto-stealerVerified
- AppsFlyer Incident History | Statusfieldhttps://statusfield.com/services/appsflyer/incidentsVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to propagate malicious code across applications, thereby reducing the blast radius of the compromise.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to inject malicious code into the SDK may have been constrained, reducing the likelihood of initial compromise.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges within applications may have been constrained, reducing the scope of potential damage.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement across applications may have been limited, reducing the spread of the malicious code.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish command and control channels may have been constrained, reducing the effectiveness of data exfiltration.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate sensitive data may have been limited, reducing the risk of data loss.
The financial impact and erosion of user trust may have been reduced, limiting the overall damage to the organization.
Impact at a Glance
Affected Business Functions
- Marketing Analytics
- User Engagement Tracking
- Campaign Attribution
Estimated downtime: 2 days
Estimated loss: N/A
Potential exposure of cryptocurrency wallet addresses and associated transaction metadata.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict unauthorized code execution within applications.
- • Enhance Egress Security & Policy Enforcement to monitor and control outbound communications from applications.
- • Deploy Threat Detection & Anomaly Response mechanisms to identify and respond to unusual behaviors indicative of compromise.
- • Utilize Multicloud Visibility & Control to gain comprehensive insights into application behaviors across different environments.
- • Regularly audit and secure third-party SDKs and dependencies to prevent supply chain attacks.



