Wednesday, March 11, 2026
No Result
View All Result
The Crypto HODL
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Marketcap
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
No Result
View All Result
The Crypto HODL
No Result
View All Result

Android Phone Crypto Wallets Could Be at Risk Due to MediaTek Exploit: Ledger

March 11, 2026
in Web3
Reading Time: 4 mins read
0 0
A A
0
Home Web3
Share on FacebookShare on Twitter



Briefly

Ledger researchers say a flaw in sure MediaTek-powered Android telephones might expose encrypted person information in about 45 seconds.
The exploit permits attackers to retrieve a tool PIN and decrypt storage earlier than Android even boots.
MediaTek issued a repair to gadget makers in January, although the corporate didn’t publicly handle the problems till March.

A vulnerability in sure Android smartphones powered by MediaTek processors might enable attackers to extract encrypted person information in beneath a minute utilizing solely a USB connection, in keeping with new analysis from cryptocurrency {hardware} pockets maker Ledger.

Ledger’s inside safety analysis workforce, referred to as the Donjon, discovered that white hat hackers have been in a position to exhibit the flaw by connecting a Nothing CMF Cellphone 1 to a laptop computer and compromising the gadget’s safety in beneath 45 seconds.

“Donjon has struck once more, discovering a MediaTek vulnerability probably impacting thousands and thousands of Android telephones. One other reminder that smartphones aren’t constructed for safety,” Ledger Chief Know-how Officer Charles Guillemet wrote on X. “Even when powered off, person information—together with PINs and [seed phrases]—might be extracted in beneath a minute.”

The Donjon workforce reported they have been in a position to recuperate the Nothing CMF Cellphone 1’s PIN, decrypt its storage, and extract seed phrases from a number of crypto wallets with out booting Android, together with Belief Pockets, Base, Kraken Pockets, Rabby, Tangem’s cellular pockets, and Phantom.

With out ever even booting into Android, the exploit routinely recovered the telephone’s PIN, decrypted its storage, and extracted the seed phrases from the most well-liked software program wallets.

— Charles Guillemet (@P3b7_) March 11, 2026

Launched in 2024 by London-based Nothing, the Nothing CMF Cellphone 1 is a low-cost and modularly customizable cell phone that runs the Android working system. The exploit targets the telephone’s safe boot chain, Donjon mentioned, which permits an attacker to attach by means of USB and extract root cryptographic keys earlier than the working system hundreds, enabling the gadget’s storage to be decrypted offline.

Based on a July 2025 report by Chainalysis, private pockets compromises represented a rising share of complete cryptocurrency theft, with attackers more and more concentrating on particular person customers, making up 23.35% of all stolen fund exercise YTD in 2025.

Ledger mentioned the Donjon workforce found the vulnerability whereas analyzing Android’s flash encryption safety. The corporate disclosed the exploit to MediaTek and Trustonic beneath a 90-day accountable disclosure coverage, and the vulnerability was publicly disclosed by MediaTek earlier this month.

]]>

Different units that use MediaTek chips embrace the crypto-centric Solana Seeker, together with smartphones from manufacturers together with Samsung, Motorola, Xiaomi, POCO, Realme, Vivo, OPPO, Tecno, and iQOO. Nonetheless, it isn’t but clear which different handsets past the Nothing CMF Cellphone 1 could also be vulnerable to the exploit.

Though the demonstration centered on crypto wallets, Donjon mentioned the publicity might prolong to different delicate info saved on the gadget, together with messages, images, monetary info, and account credentials.

Crypto wallets sometimes are available two flavors: software program and {hardware} wallets designed to retailer non-public keys that enable customers to entry their digital property. Software program or scorching wallets are designed for cellular units, whereas bodily {hardware} wallets are meant for use with desktop or laptop computer computer systems. These wallets, just like the Ledger Nano S, might be faraway from computer systems for higher safety.

Nonetheless, software program wallets are extra accessible and sometimes free to obtain and use, in comparison with {hardware} wallets that may range in value. Nonetheless, Guillemet mentioned the software-only strategy comes with trade-offs, and highlights a basic architectural distinction between “general-purpose” telephone chips and people particularly designed for personal key safety.

“Common-purpose chips are constructed for comfort,” he wrote. “Safe Components are constructed for key safety. A devoted Safe Factor isolates secrets and techniques from the remainder of the system, defending them even beneath bodily assault.”

Each day Debrief E-newsletter

Begin each day with the highest information tales proper now, plus unique options, a podcast, movies and extra.



Source link

Tags: AndroidcryptodueexploitLedgerMediaTekphoneRiskWallets
Previous Post

Nifty Gateway has shut down, but NFTs are not dead—they are evolving – The Art Newspaper

Next Post

Will XRP Reach $4 In 2026? Analyst Predicts How Far Price Can Go

Related Posts

Democrats Introduce Bill to Ban Prediction Market Contracts on War and Death
Web3

Democrats Introduce Bill to Ban Prediction Market Contracts on War and Death

March 11, 2026
China Plays the Long Game in AI While US Chases Superintelligence: Brookings
Web3

China Plays the Long Game in AI While US Chases Superintelligence: Brookings

March 11, 2026
Elon Musk’s X Money App Nears Public Launch, No Sign of Dogecoin
Web3

Elon Musk’s X Money App Nears Public Launch, No Sign of Dogecoin

March 10, 2026
Wall Street Banks Weigh Lawsuit Over Crypto Banking Charters
Web3

Wall Street Banks Weigh Lawsuit Over Crypto Banking Charters

March 10, 2026
Elon Musk’s Grok Faces UK Backlash After AI Posts Mock Football Tragedies
Web3

Elon Musk’s Grok Faces UK Backlash After AI Posts Mock Football Tragedies

March 10, 2026
Nigel Farage Backs Bitcoin Treasury Firm Chaired By Former Chancellor
Web3

Nigel Farage Backs Bitcoin Treasury Firm Chaired By Former Chancellor

March 9, 2026
Next Post
Will XRP Reach $4 In 2026? Analyst Predicts How Far Price Can Go

Will XRP Reach $4 In 2026? Analyst Predicts How Far Price Can Go

Mastercard Launches Crypto Partner Program With 85+ Firms to Power Global On-Chain Payments

Mastercard Launches Crypto Partner Program With 85+ Firms to Power Global On-Chain Payments

ICYMI: Ethereum Co-Founder Has Been Moving ETH To Exchanges, Here’s How Much

ICYMI: Ethereum Co-Founder Has Been Moving ETH To Exchanges, Here’s How Much

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Twitter Instagram LinkedIn Telegram RSS
The Crypto HODL

Find the latest Bitcoin, Ethereum, blockchain, crypto, Business, Fintech News, interviews, and price analysis at The Crypto HODL

CATEGORIES

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Mining
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Videos
  • Web3

SITE MAP

  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Crypto Marketcap

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In