Apifox Desktop Client Suffers Supply Chain Attack, Malicious Code Can Steal Credentials and Execute Commands Remotely

robot
Abstract generation in progress

Mars Finance reports that according to SlowMist monitoring, the Apifox desktop client has been targeted by a supply chain attack. Its official CDN-hosted front-end script files have been injected with highly obfuscated malicious JavaScript code. Affected users may face risks such as credential theft, sensitive data leaks, and remote command execution, with the malicious code executing automatically and remaining highly covert. SlowMist recommends users immediately revoke all tokens, reset passwords, log out and log back in to invalidate sessions, block the *.apifox.it.com domain, clear local storage, and review API logs and abnormal activities.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin