⚠️ CRITICAL BUG: Do NOT Play on Public PCs - Arknights Endfield Account Hijacking Risk

⚠️ CRITICAL BUG: Do NOT Play on Public PCs - Arknights Endfield Account Hijacking Risk
news
urgent
security
bug
warning
Major security flaw found in Arknights Endfield PC client. Login cache files (mmkv) lack device verification, allowing hackers to steal your account easily. Learn how to protect yourself.

⚠️ CRITICAL SECURITY WARNING: PC Client Vulnerability

Do NOT log in to Arknights: Endfield on any computer that is not your own personal desktop.

Currently, Gryphline has not implemented any device verification for login cache files. This means that the login session is not bound to your hardware.

The Vulnerability: Session Hijacking

As shown in the screenshot below, the game stores your login session in the mmkv folder.

Arknights Endfield PC Cache Vulnerability - No Device Verification

How it works:

  1. No Encryption: The login_cache and login_cache.crc files are not encrypted or bound to the PC.
  2. Remote Hijacking: If someone copies these two files from the computer you used, they can paste them into their own game folder.
  3. Direct Access: They can then bypass the login screen and remotely log in to your account directly, without needing your password or 2FA.

High-Risk Scenarios

How to Protect Yourself

Until Gryphline patches this vulnerability (adding Hardware ID verification to the cache), you must take these precautions:

  1. Play ONLY on Personal Devices: Do not log in on any computer you do not fully own and trust.
  2. Manually Clear Cache (If you used a public PC):
    • Navigate to the game directory: .../Endfield Game/mmkv/
    • DELETE all files in this folder before logging out/leaving the computer.
    • Just clicking "Logout" in-game might not be enough if the files were already copied.
  3. Enable 2FA: While this exploit bypasses the initial login, having 2-Factor Authentication enabled on your Gryphline account is still a crucial layer of defense for account settings changes.

Summary

This is a "Session Hijacking" vulnerability. It is extremely easy to exploit. Please spread the word to your fellow Administrators to prevent account theft.


Stay vigilant. We will update this post once an official patch is released.