Disclaimer: The opinions expressed by our writers are their own and do not represent the views of U.Today. The financial and market information provided on U.Today is intended for informational purposes only. U.Today is not liable for any financial losses incurred while trading cryptocurrencies. Conduct your own research by contacting financial experts before making any investment decisions. We believe that all content is accurate as of the date of publication, but certain offers mentioned may no longer be available.
Wietse Wind, the lead developer of the Xaman wallet and a prominent figure in the XRP Ledger (XRPL) ecosystem, has issued a technical advisory regarding a coordinated scam campaign active this February 2026. Following a weekend of deploying emergency filters and in-app warnings, Wind outlined six specific attack methods currently targeting the community.
Six attack vectors and social engineering with XRP
According to Wind, the current threat landscape reveals an increasingly sophisticated shift toward deceptive social engineering. The first and most prevalent method involves fraudulent sign requests that trick users into authorizing seemingly routine transactions that actually trigger the immediate transfer of XRP to addresses controlled by attackers.
Next is the use of malicious NFTs distributed via unsolicited airdrops. These assets often include "swap offers" designed to lure holders into exchanging their legitimate balances for worthless tokens.
Third, impersonation accounts on social platforms such as X and Telegram pose as official support staff to manufacture a sense of urgency and bypass user caution. Furthermore, phishing emails referencing wallet activity are used in the fourth vector.
Wind specifies that since the Xaman infrastructure, the one he is heavily engaged in, does not collect user email addresses, these campaigns rely on leaked databases from unrelated crypto breaches to create the illusion of official communication.
The fifth threat is the circulation of fake desktop wallets. Wind has clarified that no official desktop client exists for Xaman, so any such software is a definitive security risk.
Finally, the sixth threat vector involves fraudulent token giveaways that request secret keys or recovery phrases under the guise of promotional participation.
Wind stresses that the XRPL protocol remains secure and uncompromised. The attacks operate entirely at the social engineering layer, targeting user decision-making rather than network consensus. The operational takeaway is procedural discipline: verify within the official in-app support channel and treat unsolicited interaction as hostile by default.

Vladislav Sopov
Dan Burgin