Close Menu
CryptoDigestAlert.comCryptoDigestAlert.com
    What's Hot

    ADA 2x Boom Potential and Rival’s 100x Upside –

    September 7, 2025

    Tether Leases 20,000+ GPU Network to Power Freedom-First AI Platform

    November 13, 2025

    LMAX Group and Ripple Form Strategic Partnership to Integrate RLUSD Stablecoin for Institutional Trading

    January 15, 2026
    Facebook X (Twitter) Instagram
    • Privacy Policy
    • Get In Touch
    Facebook X (Twitter) Instagram
    CryptoDigestAlert.comCryptoDigestAlert.com
    • News

      Michael Saylor teases Bitcoin buy, but bulls may get less

      April 26, 2026

      IBM Quantum Hardware Cracks 15-Bit ECC Key, but Bitcoin Devs Say Random Bits Match the Result

      April 25, 2026

      XRP To $500? Engineer Points To AI Predicting Massive Surge

      April 24, 2026

      Tron Price Prediction for 2040 & 2050: How High Can It Go?

      April 23, 2026

      SpaceX $50B deal for Cursor hands SBF fresh ammo in pardon push

      April 22, 2026
    • Technology

      Trump Memecoin Slides 14% After White House Dinner Security Incident Shocks Market

      April 28, 2026

      Bitcoin Cash price forecast and why BlockchainFX is pegged as the next big crypto

      April 27, 2026

      XRP Price Outlook Strengthens as Breakout Retest Holds and Outflows Rise

      April 26, 2026

      Pi Network Sponsors Consensus 2026 Miami

      April 25, 2026

      Bitcoin Long-Term Holder Supply Drops as New LTHs Enter Market at a Loss

      April 24, 2026
    • Learn/Guide

      How to Optimize Company Operational Costs: A Manual on Modern Payment Ecosystems

      March 6, 2026

      6 Best Citizenship by Investment Programs for 2026

      February 23, 2026

      Best Smart Contract Auditors and Web3 Security Companies (2026): Ranked by Verifiable Public Evidence

      February 12, 2026

      Your Complete Guide to Smarter Investing

      January 29, 2026

      How to Use Cryptocurrency for Everyday Shopping in 2026

      January 23, 2026
    • Regulation

      New York AG Sues Coinbase, Gemini Over Prediction Markets

      April 24, 2026

      Thailand SEC Proposes New Rules to Expand Crypto Futures Access

      April 23, 2026

      Sberbank Awaits Law to Begin Crypto Exchange Trading

      April 22, 2026

      CFTC Wins Arizona TRO as Prediction Markets Criminal Case Pauses

      April 11, 2026

      MSBT: Morgan Stanley’s Bitcoin ETF Ready for Launch Tomorrow

      April 8, 2026
    • Live Pricing Chart
    CryptoDigestAlert.comCryptoDigestAlert.com
    Home»Technology»MediaTek chip flaw exposed crypto wallets and passwords without booting Android
    Technology

    MediaTek chip flaw exposed crypto wallets and passwords without booting Android

    March 12, 20263 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    MediaTek chip flaw exposed crypto wallets and passwords without booting Android
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Security researchers at Ledger have discovered a major flaw in some Android smartphone chips that lets an attacker siphon encrypted user data like passwords and private keys in a matter of seconds using just a USB connection.

    Summary

    • Ledger’s Donjon security team discovered a vulnerability in MediaTek and Trustonic TEE chips that could allow attackers to extract encrypted data from Android phones in under 45 seconds.
    • The exploit bypasses the secure boot chain before Android loads, allowing attackers to recover the device PIN, decrypt storage and extract seed phrases from popular wallets.

    The vulnerability was first spotted in January by Ledger’s internal security research team, Donjon, Ledger Chief Technology Officer Charles Guillemet wrote in a recent X post. 

    According to Guillemet, the vulnerability affected smartphones powered by MediaTek and Trustonic’s TEE processors. 

    MediaTek has since issued a security patch to fix the issue; users who have not installed the latest security updates on their devices may still remain at risk.

    White hat hackers were able to penetrate a smartphone from manufacturer Nothing, notably the company’s CMF 1 phone, in under 45 seconds using a laptop.

    “Without ever even booting into Android, the exploit automatically recovered the phone’s PIN, decrypted its storage, and extracted the seed phrases from the most popular software wallets,” Guillemet said.

    This puts software wallets like Trust Wallet, Base, Kraken Wallet, Rabby, Tangem’s mobile wallet, and Phantom at risk, as the seed phrases and other sensitive credentials are stored locally on the device.

    In their report, researchers noted that the vulnerability allowed attackers with physical access to bypass the phone’s security protections through the secure boot chain, which is a core startup process that runs at the highest privilege level before the operating system loads. Subsequently, the attacker can recover the device’s PIN, decrypt its storage, and extract the information.

    “This has the potential to affect millions of Android smartphones,” Guillemet added.

    Estimates suggest nearly 36 million people manage digital assets on their smartphones, which means that if attackers manage to exploit a vulnerability, it could put a large number of wallets at risk. 

    Guillemet advised using devices with dedicated secure elements that are built for key protection and can safeguard sensitive data even under physical attack.

    The Ledger team also detailed a separate attack it tested on MediaTek Dimensity 7300 processors (MT6878) in December, where the team used electromagnetic fault injection to disrupt the chip’s boot process. It allowed them to bypass security checks and ultimately gain full control over the smartphone at the highest privilege level.

    As covered by crypto.news on several occasions, crypto users have been targeted across multiple platforms, including iOS, macOS, and Windows.

    While Android devices are often easier to compromise due to Google’s more open ecosystem and flexible app distribution model, Apple’s iOS devices have also developed unique attack vectors that target users through malicious frameworks embedded inside otherwise legitimate apps.

    For instance, last year, security researchers discovered a malicious app that infiltrated both iOS and Android devices by requesting file access and subsequently scanning device storage to extract wallet data. Although not as technically severe in nature as hardware-level exploits, the scheme still managed to steal more than $1.8 million in cryptocurrency.

    Around the same time, Kaspersky flagged a malware campaign that spread through malicious software development kits embedded in seemingly harmless apps.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Trump Memecoin Slides 14% After White House Dinner Security Incident Shocks Market

    April 28, 2026

    Bitcoin Cash price forecast and why BlockchainFX is pegged as the next big crypto

    April 27, 2026

    XRP Price Outlook Strengthens as Breakout Retest Holds and Outflows Rise

    April 26, 2026

    Pi Network Sponsors Consensus 2026 Miami

    April 25, 2026
    Top Posts

    SBI Digital Markets Partners With Chainlink to Launch Cross-Chain Asset Hub

    November 7, 2025

    How AI and user-owned data are redefining personal finance

    November 12, 2025

    SOL eyes $250 after $1B liquidity surge

    September 9, 2025

    Welcome to CryptoDigestAlert.com! Your go-to source for fast, reliable updates from the ever-evolving world of cryptocurrency. Whether it's Bitcoin, altcoins, blockchain breakthroughs, or DeFi trends, we bring you timely insights, expert analysis, and key developments shaping the future of digital finance. Stay ahead with real-time crypto news and in-depth coverage.

    Top Insights

    Michael Saylor teases Bitcoin buy, but bulls may get less

    April 26, 2026

    IBM Quantum Hardware Cracks 15-Bit ECC Key, but Bitcoin Devs Say Random Bits Match the Result

    April 25, 2026

    XRP To $500? Engineer Points To AI Predicting Massive Surge

    April 24, 2026
    Advertisement
    Demo
    • News
    • Technology
    • Learn/Guide
    • Regulation
    • Business
    • Live Pricing Chart
    © 2026. Burleys Holdings Ltd Company Reg: 15927118 - Unit 15 Manor Farm, Tarnock, Axbridge, UK, BS26 2SL - Design & SEO + GEO Developed By SEO - Craig Burley

    Type above and press Enter to search. Press Esc to cancel.