Bilibili Employee Injected Malicious Code into Web Frontend, Triggering Account Ban Messages
A former Bilibili engineer inserted malicious JavaScript into the platform's web frontend, causing some users to see a fake account‑ban notice, which exposed internal code‑review weaknesses and sparked widespread discussion about insider threats and web security.
On January 20, a former Bilibili employee named Ni Moucheng used his privileged access to embed malicious JavaScript into Bilibili's web frontend via a personal domain, causing affected users to encounter a fake "your account has been banned" page.
The incident was not caused by a technical vulnerability but by abuse of internal privileges; Bilibili promptly dismissed the employee, removed the malicious script, and began an internal investigation.
Ni was a key contributor to the open‑source DanmakuX Android danmaku engine, which provides efficient rendering, multi‑core optimization, and customizable display options for live‑stream comments.
The injected script was loaded from hxxps://www.jakobzhao.online/main.js and possibly from the employee’s personal blog, both of which now show no DNS resolution.
This attack highlighted shortcomings in Bilibili's code review and release processes, raising concerns about internal security controls and the risk of insider threats.
Users were advised to clear browser caches and cookies to eliminate any residual effects, and the incident sparked extensive discussion on forums about the need for stronger security practices and open‑source transparency.
Top Architect
Top Architect focuses on sharing practical architecture knowledge, covering enterprise, system, website, large‑scale distributed, and high‑availability architectures, plus architecture adjustments using internet technologies. We welcome idea‑driven, sharing‑oriented architects to exchange and learn together.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.