Close Menu
StreamLineCrypto.comStreamLineCrypto.com
  • Home
  • Crypto News
  • Bitcoin
  • Altcoins
  • NFT
  • Defi
  • Blockchain
  • Metaverse
  • Regulations
  • Trading
What's Hot

A Quiet Rotation Into Altcoins May Already Be Underway: Altseason Hopes Return

May 13, 2026

Anthropic rejects PreStocks tokens as shares void

May 13, 2026

Global financial crisis fears grow as bond yields hit 1998 levels and Bitcoin drops below $80,000

May 13, 2026
Facebook X (Twitter) Instagram
Wednesday, May 13 2026
  • Contact Us
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms of Use
  • DMCA
Facebook X (Twitter) Instagram
StreamLineCrypto.comStreamLineCrypto.com
  • Home
  • Crypto News
  • Bitcoin
  • Altcoins
  • NFT
  • Defi
  • Blockchain
  • Metaverse
  • Regulations
  • Trading
StreamLineCrypto.comStreamLineCrypto.com

MediaTek chip flaw exposed crypto wallets and passwords without booting Android

March 12, 2026Updated:March 12, 2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
MediaTek chip flaw exposed crypto wallets and passwords without booting Android
Share
Facebook Twitter LinkedIn Pinterest Email
ad

Safety researchers at Ledger have found a serious flaw in some Android smartphone chips that lets an attacker siphon encrypted consumer information like passwords and personal keys in a matter of seconds utilizing only a USB connection.

Abstract

  • Ledger’s Donjon safety crew found a vulnerability in MediaTek and Trustonic TEE chips that might enable attackers to extract encrypted information from Android telephones in underneath 45 seconds.
  • The exploit bypasses the safe boot chain earlier than Android hundreds, permitting attackers to get well the machine PIN, decrypt storage and extract seed phrases from widespread wallets.

The vulnerability was first noticed in January by Ledger’s inner safety analysis crew, Donjon, Ledger Chief Know-how Officer Charles Guillemet wrote in a current X put up. 

In line with Guillemet, the vulnerability affected smartphones powered by MediaTek and Trustonic’s TEE processors. 

MediaTek has since issued a safety patch to repair the problem; customers who haven’t put in the newest safety updates on their units should still stay in danger.

White hat hackers have been capable of penetrate a smartphone from producer Nothing, notably the corporate’s CMF 1 cellphone, in underneath 45 seconds utilizing a laptop computer.

“With out ever even booting into Android, the exploit mechanically recovered the cellphone’s PIN, decrypted its storage, and extracted the seed phrases from the most well-liked software program wallets,” Guillemet mentioned.

This places software program wallets like Belief Pockets, Base, Kraken Pockets, Rabby, Tangem’s cellular pockets, and Phantom in danger, because the seed phrases and different delicate credentials are saved regionally on the machine.

Of their report, researchers famous that the vulnerability allowed attackers with bodily entry to bypass the cellphone’s safety protections by the safe boot chain, which is a core startup course of that runs on the highest privilege stage earlier than the working system hundreds. Subsequently, the attacker can get well the machine’s PIN, decrypt its storage, and extract the knowledge.

“This has the potential to have an effect on tens of millions of Android smartphones,” Guillemet added.

Estimates counsel practically 36 million folks handle digital belongings on their smartphones, which implies that if attackers handle to take advantage of a vulnerability, it might put a lot of wallets in danger. 

Guillemet suggested utilizing units with devoted safe parts which are constructed for key safety and might safeguard delicate information even underneath bodily assault.

The Ledger crew additionally detailed a separate assault it examined on MediaTek Dimensity 7300 processors (MT6878) in December, the place the crew used electromagnetic fault injection to disrupt the chip’s boot course of. It allowed them to bypass safety checks and finally achieve full management over the smartphone on the highest privilege stage.

As lined by crypto.information on a number of events, crypto customers have been focused throughout a number of platforms, together with iOS, macOS, and Home windows.

Whereas Android units are sometimes simpler to compromise on account of Google’s extra open ecosystem and versatile app distribution mannequin, Apple’s iOS units have additionally developed distinctive assault vectors that focus on customers by malicious frameworks embedded inside in any other case respectable apps.

As an example, final 12 months, safety researchers found a malicious app that infiltrated each iOS and Android units by requesting file entry and subsequently scanning machine storage to extract pockets information. Though not as technically extreme in nature as hardware-level exploits, the scheme nonetheless managed to steal greater than $1.8 million in cryptocurrency.

Across the similar time, Kaspersky flagged a malware marketing campaign that unfold by malicious software program improvement kits embedded in seemingly innocent apps.

ad
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Related Posts

A Quiet Rotation Into Altcoins May Already Be Underway: Altseason Hopes Return

May 13, 2026

Anthropic rejects PreStocks tokens as shares void

May 13, 2026

Global financial crisis fears grow as bond yields hit 1998 levels and Bitcoin drops below $80,000

May 13, 2026

Coinbase CEO Says Crypto Bill Could Rewire American Finance — Senate Votes Thursday

May 13, 2026
Add A Comment
Leave A Reply Cancel Reply

ad
What's New Here!
A Quiet Rotation Into Altcoins May Already Be Underway: Altseason Hopes Return
May 13, 2026
Anthropic rejects PreStocks tokens as shares void
May 13, 2026
Global financial crisis fears grow as bond yields hit 1998 levels and Bitcoin drops below $80,000
May 13, 2026
Bitcoin Just Entered A Deceptive Territory, Here’s What You Should Know
May 13, 2026
Coinbase CEO Says Crypto Bill Could Rewire American Finance — Senate Votes Thursday
May 13, 2026
Facebook X (Twitter) Instagram Pinterest
  • Contact Us
  • Privacy Policy
  • Cookie Privacy Policy
  • Terms of Use
  • DMCA
© 2026 StreamlineCrypto.com - All Rights Reserved!

Type above and press Enter to search. Press Esc to cancel.