Hackers implant stealer in critical XRP library to steal private keys

Security firm Aikido Security has discovered a stealer in a key XRP development library, and the XRP team recommends staying vigilant and updating to non-vulnerable versions.

In the dynamic world of cryptocurrency, security is a fundamental pillar for maintaining user trust and ecosystem integrity. However, recent events have put the XRP community on high alert: A group of hackers has managed to insert a stealer—malicious software designed to steal private keys—into a critical library used in the development of applications for the XRP network.

This attack specifically affects versions 4.2.1 through 4.2.4 of the library NPM XRPL.js, managed by the XRP Ledger Foundation team. The severity of the event lies in the direct risk to user security, as users may see their private keys, essential for the secure management of their digital assets, compromised. Therefore, choosing a secure space to store and manage your cryptocurrencies is vital, not only to avoid losses but also for your peace of mind when managing these assets.

MANAGE YOUR CRYPTOCURRENCIES SECURELY

Details of the attack on XRPL.js library versions 4.2.1-4.2.4

The attack materialized through the insertion of malicious code into the XRPL.js library, a tool that is essential for developers creating applications on the XRP network. Hackers managed to compromise the package distributed through NPM, exclusively affecting versions 4.2.1 through 4.2.4. This library allows interaction with the XRP Ledger, facilitating transaction and wallet management.

By altering this critical tool, cybercriminals created a stealth attack capable of intercepting and sending users' private keys without their knowledge. Access to these keys represents complete possession of their funds, which can lead to direct theft and irrecoverable losses. The code manipulation was carried out stealthily, taking advantage of the trust that developers and users place in the software, increasing the danger of the attack and the urgent need for rigorous security reviews.

Vulnerability discovery by Aikido Security

The cybersecurity company Aikido Security was the one who detected the threat and publicly announced the discovery. Through an exhaustive analysis of the software's dependencies and supply chain, they identified the presence of a stealer implanted in the XRPL.js library.

Aikido Security issues warning about XRP stealer

Using auditing and packet monitoring tools, Aikido detected unusual requests and data exfiltration to external servers controlled by the hackers. Their report highlights the stealer's ability to capture private keys stored or managed through the library before transactions are executed.

Furthermore, Aikido emphasized the importance of constantly validating software integrity, especially in ecosystems as sensitive as cryptocurrencies. His professional work demonstrates how security in development doesn't end with release, but rather requires continuous vigilance to prevent and mitigate sophisticated attacks.

BUY XRP WITH CONFIDENCE AND SECURITY

How does the stealer steal and send private keys?

The stealer embedded in the library acts as a latent threat that is activated every time a user interacts with the compromised software. It essentially intercepts operations involving private keys—such as signing transactions—and duplicates this confidential information to send it to a server controlled by the hackers.

To illustrate, when an XRPL.js-based application generates a transaction, the stealer extracts the private key before completing it and secretly transmits it. The keys are sent without any additional user action or visible alerts, making the threat very difficult to identify in time. This mechanism puts not only individual wallets at risk, but also the trust and security of the entire XRP network, demonstrating why software security is a critical priority.

Impact on users and ecosystem XRP Ledger Foundation

Users affected by the blockchain breach are at direct risk of losing control over their digital assets, as the exposure of their private keys allows for full access and wallet deletion. Trust in the XRP network is severely damaged, potentially leading to a drop in adoption and a negative impact on the value of the XRP cryptocurrency.

The XRP Ledger Foundation, the entity responsible for maintaining and improving the network, faces the urgent task of detecting the damage, correcting the affected versions, and regaining the trust of its community. Furthermore, the incident highlights vulnerabilities in the cryptographic software supply chain, prompting developers and organizations to implement stricter security, version control, and auditing measures. The community must remain vigilant and update its applications and dependencies to avoid further consequences.

Importance of good practices in secure development

This attack underscores the critical need to adopt and maintain good security practices in software development, especially in highly sensitive projects such as those related to cryptocurrencies. Some of these best practices include validating and verifying the integrity of all dependencies, using digital signatures, implementing continuous reviews and audits by specialized teams, and adopting policies to manage the software lifecycle with a focus on cybersecurity.

Furthermore, it's critical to educate developers about the inherent risks and design systems that minimize attack entry points. Cooperation between development, security, and community teams is essential to address these threats. Only with sound practices can private keys—the most valuable asset for any XRP or other cryptocurrency user—be protected.


Investing in cryptoassets is not fully regulated, may not be suitable for retail investors due to high volatility and there is a risk of losing all invested amounts.