Cryptoemg
  • Home
    • Latest Featured Posts
  • News
    • Altcoins
    • Bitcoin News
    • DeFi
    • Ethereum News
    • Latest News
    • Regulations
  • Market Analysis
    • Fundamental Analysis
    • On-Chain Data
    • Technical Analysis
  • Guides & Tutorials
    • Beginner’s Guide
    • Security Tips
    • Staking & Yield Farming
    • Trading Strategies
  • NFT & Metaverse
    • Metaverse Trends
    • NFT News
  • Reviews
    • Crypto Projects
    • Exchanges
    • Wallets
  • Tools
    • Gas Fee Checker
    • Price Tracker
    • ROI Calculator
  • Community
    • Airdrops & Giveaways
    • Events & Webinars
    • Forum/Discussion
Reading: XRP Ledger SDK Compromised by Backdoor Exploit
Share
CryptoemgCryptoemg
Font ResizerAa
  • Home
  • Contact
Search
  • Home
    • Latest Featured Posts
  • News
    • Altcoins
    • Bitcoin News
    • DeFi
    • Ethereum News
    • Latest News
    • Regulations
  • Market Analysis
    • Fundamental Analysis
    • On-Chain Data
    • Technical Analysis
  • Guides & Tutorials
    • Beginner’s Guide
    • Security Tips
    • Staking & Yield Farming
    • Trading Strategies
  • NFT & Metaverse
    • Metaverse Trends
    • NFT News
  • Reviews
    • Crypto Projects
    • Exchanges
    • Wallets
  • Tools
    • Gas Fee Checker
    • Price Tracker
    • ROI Calculator
  • Community
    • Airdrops & Giveaways
    • Events & Webinars
    • Forum/Discussion
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Cryptoemg > Blog > Technical Analysis > XRP Ledger SDK Compromised by Backdoor Exploit
Technical Analysis

XRP Ledger SDK Compromised by Backdoor Exploit

cryptoemg

Contents
Security Flaw in Developer KitXRPL Issues Urgent Patch

The XRP Ledger Foundation has warned about a security vulnerability in the official JavaScript SDK, which interacts with the XRPL.

On April 21, Aikido Security revealed that several versions of its Node Package Manager (NPM) software were compromised and published, containing a backdoor that could steal private keys from users.

Security Flaw in Developer Kit

The XRP Ledger Foundation confirmed the issue in an April 22 statement:

“Earlier today, a security researcher from @AikidoSecurity identified a serious vulnerability in the xrpl npm package (v4.2.1-4.2.4 and v2.14.2).”

In response to the breach, Wietse Wind, founder and CEO of XRPL Labs, reassured users that Xaman Wallet was not affected by the flaw. Wind explained that the product does not use xrpl.js but instead relies on its xrpl-client and xrpl-accountlib libraries, which separate wallet connectivity from the signing process.

He also detailed how the incident unfolded, stating that malicious code in the xrpl.js package sent generated or imported private keys to an external server controlled by the attacker. This enabled hackers to collect key pairs, wait for the wallets to be funded, and then steal the assets.

Wind urged anyone who had recently created an XRP wallet using the API or related tools to assume it had been compromised and to transfer their funds immediately.

He emphasized that such attacks can happen to any software relying on third-party libraries, and that developers must take precautions. He also advised limiting publishing access, scanning code before release, avoiding auto-publishing pipelines, and not managing private keys directly unless fully prepared to handle the associated risks.

XRPL Issues Urgent Patch

Following the incident, the XRP Ledger Foundation has released a clean version of the NPM package, removing the malicious code and ensuring the SDK is safe for developers to use again.

Aikido Security discovered the vulnerability after its automated threat monitoring system flagged suspicious updates to the XRPL package on NPM. These updates, published by a user named “mukulljangid”, included five new versions that did not match any official releases on the XRP Ledger’s GitHub repository.

After investigating, Aikido found that the compromised versions contained a malicious function called checkValidityOfSeed, which sent private keys to the hacker’s server at 0x9c[.]xyz, when users created a wallet that could allow them to steal their crypto.

Early versions (v4.2.1 and v4.2.2) hid the backdoor in compiled JavaScript files, while later versions (v4.2.3 and v4.2.4) embedded the malicious code directly in TypeScript source files, making it harder to detect. The compromised packages also removed development tools like Prettier and build scripts from the package.json file, showing intentional manipulation.

The incident comes only weeks after Ripple announced a $1.25 billion acquisition of prime brokerage firm Hidden Road, a move experts believe will turn XRPL into a major conduit for institutional funds.

According to Ripple CEO Brad Garlinghouse, the network will be used for post-trade settlements on some transactions, potentially turning it into a corporate-scale clearing and credit platform.

SPECIAL OFFER (Sponsored)

Binance Free $600 (CryptoPotato Exclusive): Use this link to register a new account and receive $600 exclusive welcome offer on Binance (full details).

LIMITED OFFER for CryptoPotato readers at Bybit: Use this link to register and open a $500 FREE position on any coin!

Source link

You Might Also Like

XLM Charts Signal $1 Move as Pattern Takes Shape

MYX Finance Explodes by 280% Daily, Bitcoin Flirts With $113K: Market Watch

XRP’s 6% Weekly Surge Is Just the Warm-Up Before the Real Rally: Analyst

OKB Explodes Above $200 With 13% Surge, BTC Price Defends $110K Level: Weekend Watch

$1B Bitcoin Treasury Fund from Sora Ventures Launches in Asia

cryptoemg April 23, 2025 April 23, 2025
Previous Article Crypto FIFA video game launching on mobile devices in June
Next Article US exchanges bet big on crypto derivatives amid tariff turbulence
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

© 2025 cryptoemg.. All Rights Reserved.  Terms  |  Privacy  |  Contact

Welcome Back!

Sign in to your account

Lost your password?