Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
Apifox supply chain attack

Apifox supply chain attack

Type
Incident
Actors
❓Unknown
Pub. date
March 26, 2026
Initial access
Unknown
Impact
Supply chain attack
Observed techniques
Supply Chain CompromiseCredential theftCredential harvesting from code repository
Targeted technologies
Apifox Desktop ClientElectron
References
https://slowmist.medium.com/security-alert-supply-chain-attack-on-apifox-desktop-client-via-compromised-official-cdn-script-bc3870992564
Status
Finalized
Last edited
Apr 5, 2026 2:30 PM

The Apifox incident is a client-side supply chain attack in which attackers compromised an official CDN-hosted JavaScript resource (apifox-app-event-tracking.min.js) and injected heavily obfuscated malicious code into a trusted analytics script. Because the Apifox desktop client is built on an Electron framework, it automatically loads and executes this remote script during application startup, allowing the attacker to achieve code execution within the desktop application context without user interaction.

Once executed, the payload performed multi-stage credential harvesting and system reconnaissance, extracting authentication tokens from local storage and collecting sensitive developer artifacts (SSH keys, Git credentials, Kubernetes configs, npm tokens, shell history). The malware then established encrypted command-and-control (C2) communication, periodically exfiltrating data and retrieving additional payloads for execution, effectively turning the client into a persistent backdoor with remote command execution (RCE) capabilities.