PANews reported on March 26 that, according to SlowMist's monitoring, the Apifox desktop client suffered a supply chain attack, with its official CDN-hosted front-end script files being injected with highly obfuscated malicious JavaScript code. Affected users may face risks such as credential theft, sensitive data leakage, and remote command execution. The malicious code is automated and highly stealthy. SlowMist advises users to immediately revoke all tokens, reset passwords, log out and log back in to invalidate sessions, block the *.apifox.it.com domain, clear local storage, and review API logs and abnormal activity.
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact
crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.