March 10th, 2026 Incident: FAQ
Security Incident Overview
AppsFlyer’s internal monitoring detected the anomaly at 00:22 UTC on March 10, and our teams worked quickly with the registrar to restore control of the domain. During the incident window, starting with 00:31 UTC, traffic for websdk.appsflyer.com was redirected to attacker-controlled infrastructure and a modified Web SDK was temporarily served to some website visitors.
All services were fully restored by 09:47 UTC on March 10.
* websdk.appsflyer.com was redirected to attacker controlled infrastructure, and a modified WebSDK was served to end users. (incident window March 10, approximately 00:31 – 09:47 UTC).
* Some AppsFlyer properties and services experienced a temporary service disruption due to the domain configuration changes. (incident window March 9, 23:26 – March 10th 09:47 UTC).
* Corporate email services experienced a brief disruption during the incident window.
AppsFlyer’s core systems, infrastructure, and customer data environments were not compromised, although the availability of certain services was temporarily affected during the incident window.
The AppsFlyer Mobile SDK was not affected by this incident.
Indicators of Compromise (IOCs)
Malicious Nameservers
ns1.gcorelabs.net — Attacker-controlled NS
ns2.gcdn.services — Attacker-controlled NS
Malicious IP
81.28.12.12 — IP serving tampered SDK via Gcore CDN
TLS Certificate CN
CN=*.gcdn.co — Wildcard cert on attacker infrastructure
TLS Certificate Org
G-Core Innovations S.a.r.l — Certificate issuer on attacker infrastructure
As previously communicated, the activity occurred within the client-side browser environment of website visitors, which means any related behaviour would appear in website or application logs rather than within AppsFlyer systems. We therefore recommend reviewing logs for any unusual activity.
For customers whose websites loaded the AppsFlyer Web SDK or Smart Banner during the incident window, a modified SDK was temporarily served through websdk.appsflyer.com. Because the Web SDK executes within the browser environments of website visitors, the code could have accessed data available within those browser sessions. As this activity occurred within visitor browsers rather than AppsFlyer systems, AppsFlyer does not have visibility into actions that may have occurred within those browser environments.
Customers who configured an IP allowlist for their account were not subject to automatic token revocation – such customers may evaluate whether manual rotation is appropriate for their environment.
* Secured and restored control of the affected domain registrar account and are in the process of moving to a new domain registrar
* Restored multi-factor authentication on the registrar account
* Notified law enforcement
* Redirected the Web SDK delivery path to verified, secure infrastructure and introduced a new dedicated Web SDK endpoint
* Reset all user session to hq1.appsflyer.com
* Disabled raw data access, and invalidated all V2 API tokens across the platform as a precautionary measure
* Engaged external forensic security experts to conduct an independent investigation alongside our own
* Worked with our managed partners to redirect their engagements to a new endpoint, to minimize impact on attribution
* Communicated proactively to all customers and partners throughout the incident, beginning within hours of detection and continuing as our understanding developed
These actions include:
* Migrating domain management to a new registrar provider and hardened domain governance infrastructure, with stronger access controls and administrative safeguards.
* Implementing proactive DNS and domain monitoring, including automated alerting on unexpected DNS or registrar account changes.
* Strengthening registrar account security controls, including enhanced authentication requirements and restricted administrative access.
* Reviewing and tightening third-party vendor security requirements to ensure that domain registrars and DNS providers meet AppsFlyer’s security standards.
* Conducting a comprehensive post-incident review with external forensic experts to validate containment measures and identify additional improvements.
These steps are part of a broader effort to continuously strengthen AppsFlyer’s security posture and reduce the risk of similar incidents in the future.
Campaign and Measurement Impact
Some clicks routed through affected endpoints were not logged
Some app opens and in-app events during the incident window were not received
Users who installed from an ad before the incident but opened the app for the first time during the incident window may appear unattributed
Additionally, users who were exposed to an ad during the incident window but clicked or opened the app after the window may also appear unattributed — or attributed to organic, or to a later touchpoint — as the original engagement was not recorded.
As a result, installs, conversion rates, and ROAS reported in AppsFlyer for this period may understate actual campaign performance.
However, due to degraded engagement coverage during the window, some ad engagements were not recorded in real-time. As a result, users who engaged with an ad during that period may appear unattributed or attributed to organic – meaning partners may temporarily see fewer attributed conversions for that cohort.
No action is required from customers.
Machine-learning bidding systems rely on recent conversion signals. For the vast majority of apps – those on SDK v6.1 and above – session signals were routed to an unaffected endpoint and streamed normally throughout the incident.
For apps on older SDK versions or SDK-less integrations, this stream may have been partially degraded.
Some partners’ models may behave more conservatively for a short period as signal flow normalizes.
AppsFlyer has informed affected partners to account for the anomaly window. We recommend connecting with your partner account teams for any campaign-specific questions.