Close Menu
StreamLineCrypto.comStreamLineCrypto.com
  • Home
  • Crypto News
  • Bitcoin
  • Altcoins
  • NFT
  • Defi
  • Blockchain
  • Metaverse
  • Regulations
  • Trading
What's Hot

The tokenized crude project to start pilot testing soon for 2027 debut

March 12, 2026

MARA Transfers 298 Bitcoin After Opening Door To Sales

March 12, 2026

MediaTek chip flaw exposed crypto wallets and passwords without booting Android

March 12, 2026
Facebook X (Twitter) Instagram
Thursday, March 12 2026
  • Contact Us
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms of Use
  • DMCA
Facebook X (Twitter) Instagram
StreamLineCrypto.comStreamLineCrypto.com
  • Home
  • Crypto News
  • Bitcoin
  • Altcoins
  • NFT
  • Defi
  • Blockchain
  • Metaverse
  • Regulations
  • Trading
StreamLineCrypto.comStreamLineCrypto.com

MediaTek chip flaw exposed crypto wallets and passwords without booting Android

March 12, 2026Updated:March 12, 2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
MediaTek chip flaw exposed crypto wallets and passwords without booting Android
Share
Facebook Twitter LinkedIn Pinterest Email
ad

Safety researchers at Ledger have found a serious flaw in some Android smartphone chips that lets an attacker siphon encrypted consumer information like passwords and personal keys in a matter of seconds utilizing only a USB connection.

Abstract

  • Ledger’s Donjon safety crew found a vulnerability in MediaTek and Trustonic TEE chips that might enable attackers to extract encrypted information from Android telephones in underneath 45 seconds.
  • The exploit bypasses the safe boot chain earlier than Android hundreds, permitting attackers to get well the machine PIN, decrypt storage and extract seed phrases from widespread wallets.

The vulnerability was first noticed in January by Ledger’s inner safety analysis crew, Donjon, Ledger Chief Know-how Officer Charles Guillemet wrote in a current X put up. 

In line with Guillemet, the vulnerability affected smartphones powered by MediaTek and Trustonic’s TEE processors. 

MediaTek has since issued a safety patch to repair the problem; customers who haven’t put in the newest safety updates on their units should still stay in danger.

White hat hackers have been capable of penetrate a smartphone from producer Nothing, notably the corporate’s CMF 1 cellphone, in underneath 45 seconds utilizing a laptop computer.

“With out ever even booting into Android, the exploit mechanically recovered the cellphone’s PIN, decrypted its storage, and extracted the seed phrases from the most well-liked software program wallets,” Guillemet mentioned.

This places software program wallets like Belief Pockets, Base, Kraken Pockets, Rabby, Tangem’s cellular pockets, and Phantom in danger, because the seed phrases and different delicate credentials are saved regionally on the machine.

Of their report, researchers famous that the vulnerability allowed attackers with bodily entry to bypass the cellphone’s safety protections by the safe boot chain, which is a core startup course of that runs on the highest privilege stage earlier than the working system hundreds. Subsequently, the attacker can get well the machine’s PIN, decrypt its storage, and extract the knowledge.

“This has the potential to have an effect on tens of millions of Android smartphones,” Guillemet added.

Estimates counsel practically 36 million folks handle digital belongings on their smartphones, which implies that if attackers handle to take advantage of a vulnerability, it might put a lot of wallets in danger. 

Guillemet suggested utilizing units with devoted safe parts which are constructed for key safety and might safeguard delicate information even underneath bodily assault.

The Ledger crew additionally detailed a separate assault it examined on MediaTek Dimensity 7300 processors (MT6878) in December, the place the crew used electromagnetic fault injection to disrupt the chip’s boot course of. It allowed them to bypass safety checks and finally achieve full management over the smartphone on the highest privilege stage.

As lined by crypto.information on a number of events, crypto customers have been focused throughout a number of platforms, together with iOS, macOS, and Home windows.

Whereas Android units are sometimes simpler to compromise on account of Google’s extra open ecosystem and versatile app distribution mannequin, Apple’s iOS units have additionally developed distinctive assault vectors that focus on customers by malicious frameworks embedded inside in any other case respectable apps.

As an example, final 12 months, safety researchers found a malicious app that infiltrated each iOS and Android units by requesting file entry and subsequently scanning machine storage to extract pockets information. Though not as technically extreme in nature as hardware-level exploits, the scheme nonetheless managed to steal greater than $1.8 million in cryptocurrency.

Across the similar time, Kaspersky flagged a malware marketing campaign that unfold by malicious software program improvement kits embedded in seemingly innocent apps.

ad
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Related Posts

The tokenized crude project to start pilot testing soon for 2027 debut

March 12, 2026

White House Crypto Advisor Denounces Attempts To Sabotage CLARITY Act’s Goals

March 12, 2026

Binance.US Hires Compliance Lawyer as New CEO

March 12, 2026

XRP Withdrawal Surge Meets $1.4B ETF Inflows as Capital Returns to Select Altcoins

March 12, 2026
Add A Comment
Leave A Reply Cancel Reply

ad
What's New Here!
The tokenized crude project to start pilot testing soon for 2027 debut
March 12, 2026
MARA Transfers 298 Bitcoin After Opening Door To Sales
March 12, 2026
MediaTek chip flaw exposed crypto wallets and passwords without booting Android
March 12, 2026
AI Artist Mia Forrest Turns Machine Learning Into Physical Orchid Art
March 12, 2026
White House Crypto Advisor Denounces Attempts To Sabotage CLARITY Act’s Goals
March 12, 2026
Facebook X (Twitter) Instagram Pinterest
  • Contact Us
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms of Use
  • DMCA
© 2026 StreamlineCrypto.com - All Rights Reserved!

Type above and press Enter to search. Press Esc to cancel.