HomeCII/OTBackdoor Discovered in Official XRP Ledger NPM Package

Backdoor Discovered in Official XRP Ledger NPM Package

Published on

spot_img

Security Breach in XRP Ledger SDK: Urgent Action Required from Users

Recent findings have uncovered a severe security breach targeting the XRP Ledger, a widely used cryptocurrency framework. The revelation comes from Aikido Intel, a threat detection system, which disclosed that a sophisticated supply chain attack has compromised the official Node Package Manager (NPM) package for the XRP Ledger SDK, commonly referred to as xrpl.

This malicious attack introduced a backdoor designed to steal users’ private keys, enabling attackers to gain complete control over their cryptocurrency wallets. The suspicion surrounding the integrity of the SDK arose on April 21 at 20:53 GMT+0, when five new versions of the xrpl package were released on NPM. Notably, this popular package, which averages over 140,000 downloads weekly, contained malicious code that did not match the authenticated releases found on GitHub.

The compromised versions identified were 4.2.4, 4.2.3, 4.2.2, 4.2.1, and 2.14.2, while the latest legitimate version was noted to be 4.2.0 at the time of the attack. This inconsistency immediately raised red flags among security experts.

Charlie Eriksen, a malware researcher at Aikido, expressed concerns regarding the discovery in a blog post shared exclusively with Hackread.com. Eriksen emphasized that “the fact that these packages showed up without a matching release on GitHub is very suspicious.” This statement underlines the need for vigilance among developers and users who rely on the xrpl package for their cryptocurrency-related applications.

Further investigation into the rogue packages revealed unusual coding in the src/index.ts file of version 4.2.4, tagged as the latest version at the time. A function named checkValidityOfSeed, which appeared innocuous at first glance, was found to initiate an HTTP POST request to an unfamiliar domain, designated as 0x9cxyz. Analysis of the registration information associated with this domain indicated that it was recently created, which heightened concerns about its trustworthiness.

Researchers delved deeper into the nature of the malicious code, discovering that checkValidityOfSeed was invoked within essential functions, including the constructor of the Wallet class located in src/Wallet/index.ts. This vulnerability allowed the malicious code to execute whenever a Wallet object was instantiated, targeting users’ private keys immediately. Given that these keys are crucial to accessing and managing XRP funds, the ramifications of this security breach are substantial.

The evolution of the attackers’ methods was also noted in the findings. The initial malicious versions, namely 4.2.1 and 4.2.2, integrated harmful code into built JavaScript files, effectively removing scripts and prettier configurations from the package.json file. In contrast, subsequent versions—4.2.3 and 4.2.4—embedding the malicious code directly into the TypeScript source code, indicated a more refined approach to avoid detection by users and security systems alike.

In light of this alarming development, the official xrpl team has taken steps to mitigate the risks. They promptly released two secure versions of the package: 4.2.5 and 2.14.3. Users are urged to make the switch to these updated versions without delay to protect their assets and applications from potential exploitation.

Experts from Aikido were unequivocal in their warnings; they asserted that “any seed or private key that was processed by the code has been compromised” and should thus be rendered unusable. Users needing to safeguard their cryptocurrency holdings are strongly advised to transfer their assets to a new and secure wallet, generated using a new private key.

The incident serves as a stark reminder of the vulnerabilities inherent in the ever-evolving world of cryptocurrency software development. As threats become increasingly sophisticated, developers and users alike must adopt a proactive approach to security, ensuring that they remain informed and vigilant against potential breaches that could jeopardize their assets.

Source link

Latest articles

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

Securing Telecoms in the Age of AI and Critical Infrastructure

 As we reflect on World Telecommunication and Information Society Day (WTISD) 2025, marked...

The VPN You Shouldn’t Have Downloaded

Source : The Hacker NewsA sophisticated malware campaign has emerged, leveraging counterfeit VPN...

Even Resilient Organizations Are Blind to AI Threats

Organizations are underestimating the advanced technology's risks to the software supply chain, according...

More like this

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

Securing Telecoms in the Age of AI and Critical Infrastructure

 As we reflect on World Telecommunication and Information Society Day (WTISD) 2025, marked...

The VPN You Shouldn’t Have Downloaded

Source : The Hacker NewsA sophisticated malware campaign has emerged, leveraging counterfeit VPN...