
XRP Ledger Foundation Rushes Out Patch for Hacked XRPL SDK!
Date: 2025-04-23 06:42:34 | By Clara Whitlock
XRP Ledger Foundation Races to Patch Critical Vulnerability After Hackers Target Crypto Wallets
Holy smokes, the XRP Ledger Foundation just dodged a massive bullet! They've patched a gnarly vulnerability in their official JavaScript SDK that could've let hackers swipe private keys and drain crypto wallets dry. Talk about a close call!
On April 22, the XRP Ledger Foundation dropped an updated version of the XRP Ledger npm package like it was hot, yanking out the compromised code and getting things back to safe and sound for devs building on the network.
The xrpl npm package is the go-to JavaScript/TypeScript library for messing around with the XRP Ledger. Devs use it to hook up to the network, juggle wallets, sling transactions, and whip up decentralized apps using XRPL's slick features.
The update came down just hours after blockchain security firm Aikido spotted some shady stuff in five freshly published versions of the library. Talk about quick thinking!
According to Aikido's report, some bad actors had thrown up fake versions of the package on npm, starting with 4.2.1. These versions didn't jive with any official releases on GitHub, which was a big red flag that helped Aikido's automated systems sniff out the shenanigans.
Get this - the bad actors had "slipped in a backdoor to snatch cryptocurrency private keys and break into crypto wallets." Sneaky, right?
These rogue packages had hidden code that quietly siphoned off private keys by pinging a sketchy domain 0x9c.xyz controlled by the hackers. The malicious function kicked in whenever a new wallet was made, basically handing over control of funds to the attacker. Yikes!
Aikido called the vulnerability "potentially catastrophic," saying it was one of the nastiest kinds of supply chain attacks in crypto. No kidding!
Since the xrpl package gets over 140,000 weekly downloads and is baked into hundreds of thousands of websites and apps, the backdoor could've wrecked a huge chunk of the XRP ecosystem without anyone even noticing.
The attacker was also seen tweaking the malicious packages with each release. Early versions (4.2.1 and 4.2.2) only changed the built JavaScript files, probably to fly under the radar during code reviews. Later versions, like 4.2.3 and 4.2.4, injected the malicious code right into the TypeScript source files, letting the payload stick around across builds. Crafty!
Aikido researchers told users to stop using the affected versions ASAP and to rotate any private keys or seed phrases that might've been exposed. They also suggested scanning network logs for connections to the domain 0x9c.xyz and upgrading to the patched versions, 4.2.5 or 2.14.3, to keep things locked down tight.
In follow-up updates, the foundation confirmed that the compromised packages had been yeeted and that key projects like XRPScan, First Ledger, and Gen3 Games were safe and sound.
The incident didn't shake up traders; XRP was up 7.4% over the past 24 hours, trading at $2.24 at the time of writing. Talk about resilience!
Earlier this year, the XRP Ledger had another wild ride when a hiccup in transaction validation brought the network to a standstill for almost an hour on Feb. 5. But hey, no data was lost during that incident, so it could've been worse!

Disclaimer
The information provided on HotFart is for general informational purposes only. All information on the site is provided in good faith, however we make no representation or warranty of any kind, express or implied, regarding the accuracy, adequacy, validity, reliability, availability or completeness of any information on the site.
Comments (0)
Please Log In to leave a comment.