Phantom Safe from Solana Web3.js Bug; Upgrade to 1.95.8 Urged

Solana Web3
Phantom assures users it is safe from vulnerabilities in Solana Web3.js, confirming it never used affected versions and urging developers to upgrade to version 1.95.8 for enhanced security.
Journalist
Journalist
Hassan ShittuVerified
Part of the Team Since
Jun 2023
About Author

Hassan, a Cryptonews.com journalist with 6+ years of experience in Web3 journalism, brings deep knowledge across Crypto, Web3 Gaming, NFTs, and Play-to-Earn sectors. His work has appeared in...

Last updated: 

Phantom, a prominent wallet provider in the Solana ecosystem, has reassured its users that it is unaffected by a critical vulnerability recently discovered in the Solana/web3.js library.

The exploit, found in versions 1.95.6 and 1.95.7, involved malicious code designed to steal private keys. This flaw severely threatened applications and developers relying on the compromised versions, potentially exposing user funds to theft.

Phantom’s security team confirmed in a statement on X that the wallet provider has never used these versions in its infrastructure, ensuring its users remain safe.

The vulnerability has sent ripples through the Solana developer community.

Solana developer Trent Sol, who first sounded the alarm, described the compromised versions as a “secret stealer” capable of leaking private keys through seemingly legitimate CloudFlare headers.

He urged developers and projects to immediately upgrade to version 1.95.8 or roll back to unaffected version 1.95.5.

Despite these vulnerabilities, major projects such as Drift, Solflare, and Phantom confirmed their immunity, either due to avoiding the impacted versions or deploying additional security layers.

The Bug in Solana Web3.js Library: Who Is Affected?

According to a Socket.dev post, a supply chain attack compromised the Solana/web3.js library, a core component for developers building on Solana.

This type of attack, targeting dependencies widely used by developers, inserted a backdoor function named addToQueue into versions 1.95.6 and 1.95.7.

The malicious function enabled the exfiltration of private keys by disguising its activity as legitimate CloudFlare header data.

Once captured, these keys were transmitted to a hardcoded Solana wallet address identified as FnvLGtucz4E1ppJHRTev6Qv4X7g8Pw6WPStHCcbAKbfx.

Cybersecurity researchers, including Christophe Tafani-Dereeper from Datadog, analyzed the malicious versions and highlighted the sophisticated nature of the exploit.

They discovered that the domain used for the operation (sol-rpc[.]xyz) had been registered on November 22, just days before the attack became public.

The domain was hosted behind CloudFlare, with the command-and-control (C2) server now offline.

This timeline points to a carefully planned attack, likely due to a phishing or social engineering campaign targeting the library’s maintainers.

The npm package manager, which hosts Solana/web3.js, swiftly removed the compromised versions.

Developers using the affected versions were advised to update version 1.95.8 immediately or audit their projects for suspicious dependencies.

Broader Implications for Solana and Web3 Security

The Solana ecosystem has responded rapidly to mitigate the fallout.

In addition to Phantom, major projects like Backpack have assured their users that the exploit does not affect them.

Supply chain attacks like this have become increasingly common as malicious actors target the tools and libraries developers rely on.

Earlier this year, a similar attack involved a malicious Python package named “Solana-py,” which masqueraded as a legitimate API to steal wallet keys.

Similarly, in October this year, the Checkmarx threat research team uncovered a new malware campaign on the Python Package Index (PyPI) repository, targeting cryptocurrency users through a malicious package named “CryptoAITools.”

The malware masquerades itself as a legitimate cryptocurrency trading tool and uses a deceptive graphical user interface to distract victims while executing malicious activities on Windows and macOS systems.

Once installed, the malware launches a sophisticated multi-stage infection process, downloading additional components from a fake website and stealing sensitive data such as wallet recovery phrases, saved passwords, browsing history, and even Apple Notes on macOS.

Beyond the initial infection through PyPI, the campaign extends to other platforms, employing multiple social engineering tactics to lure victims.

In the Article
Bitcoin
BTC
$95,447
4.54 %
Ethereum
ETH
$3,333
7.06 %
XRP
XRP
$2.18
6.07 %
Litecoin
LTC
$78.83
3.29 %
Cardano
ADA
$0.4239
9.56 %

2M+

Active Monthly Users Around the World

250+

Guides and Reviews Articles

8

Years on the Market

70

International Team Authors
editors
+72 More
At Cryptonews, we aim to make cryptocurrency, blockchain, and Web3 understandable, and information available to everyone, no matter what level you are in your investment journey. Founded in 2017, Cryptonews has been dedicated to delivering reliable, multilingual coverage of the cryptocurrency industry.

Best Crypto ICOs

Discover trending tokens still in presale — early-stage picks with potential.

Explore Our Tools

Smart tools made for everyday crypto users

Market Overview

  • 7d
  • 1m
  • 1y
Market Cap
$3,393,200,123,264
+4.59%
Trending Crypto

More Articles

Price Analysis
XRP Overtakes Solana and Tether as Market Cap Reaches $139 Billion – Can XRP Hit $100 Next?
Simon Chandler
Simon Chandler
2024-12-02 15:32:21
Price Analysis
Is Solana in Trouble? SOL Price Turns Red with XRP Rally – Can SOL Reach $1,000 in December?
Harvey Hunter
Harvey Hunter
2024-12-02 13:38:00
Crypto News in numbers
editors
Authors List + 66 More
2M+
Active Monthly Users Around the World
250+
Guides and Reviews Articles
8
Years on the Market
70
International Team Authors