{"id":18207,"date":"2026-03-12T07:29:30","date_gmt":"2026-03-12T07:29:30","guid":{"rendered":"https:\/\/cryptoted.net\/index.php\/2026\/03\/12\/mediatek-chip-flaw-exposed-crypto-wallets-and-passwords-without-booting-android\/"},"modified":"2026-03-12T07:29:30","modified_gmt":"2026-03-12T07:29:30","slug":"mediatek-chip-flaw-exposed-crypto-wallets-and-passwords-without-booting-android","status":"publish","type":"post","link":"https:\/\/cryptoted.net\/index.php\/2026\/03\/12\/mediatek-chip-flaw-exposed-crypto-wallets-and-passwords-without-booting-android\/","title":{"rendered":"MediaTek chip flaw exposed crypto wallets and passwords without booting Android"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/crypto.news\/app\/uploads\/2023\/06\/crypto-news-hacker-writing-a-code-on-his-laptop-blurry-background-dark-neon-color-cyberpunk.jpg\" \/><\/p>\n<div>\n<p class=\"is-style-lead\">Security researchers at Ledger have discovered a major flaw in some Android smartphone chips that lets an attacker siphon encrypted user data like passwords and private keys in a matter of seconds using just a USB connection.<\/p>\n<div id=\"cn-block-summary-block_0f63c9c4cc9b4d0befbb1f75bc8d8027\" class=\"cn-block-summary\">\n<p>\n        <span class=\"tabs__item is-selected\">Summary<\/span>\n    <\/p>\n<div class=\"cn-block-summary__content\">\n<ul class=\"wp-block-list\">\n<li>Ledger\u2019s Donjon security team discovered a vulnerability in MediaTek and Trustonic TEE chips that could allow attackers to extract encrypted data from Android phones in under 45 seconds.<\/li>\n<li>The exploit bypasses the secure boot chain before Android loads, allowing attackers to recover the device PIN, decrypt storage and extract seed phrases from popular wallets.<\/li>\n<\/ul><\/div>\n<\/div>\n<p><!-- .cn-block-summary --><\/p>\n<p>The vulnerability was first spotted in January by Ledger\u2019s internal security research team, Donjon, Ledger Chief Technology Officer Charles Guillemet wrote in a recent <a href=\"https:\/\/x.com\/P3b7_\/status\/2031753534107001209?s=20\" target=\"_blank\" rel=\"nofollow\">X post<\/a>.\u00a0<\/p>\n<p>According to Guillemet, the vulnerability affected smartphones powered by MediaTek and Trustonic\u2019s TEE processors.\u00a0<\/p>\n<p>MediaTek has since issued a security patch to fix the issue; users who have not installed the latest security updates on their devices may still remain at risk.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<p>White hat hackers were able to penetrate a smartphone from manufacturer Nothing, notably the company\u2019s CMF 1 phone, in under 45 seconds using a laptop.<\/p>\n<p>\u201cWithout ever even booting into Android, the exploit automatically recovered the phone\u2019s PIN, decrypted its storage, and extracted the seed phrases from the most popular software wallets,\u201d Guillemet said.<\/p>\n<p>This puts software wallets like Trust Wallet, Base, Kraken Wallet, Rabby, Tangem\u2019s mobile wallet, and Phantom at risk, as the seed phrases and other sensitive credentials are stored locally on the device.<\/p>\n<p>In their <a href=\"https:\/\/www.ledger.com\/blog-is-your-smartphones-hardware-safe\" target=\"_blank\" rel=\"nofollow\">report<\/a>, researchers noted that the vulnerability allowed attackers with physical access to bypass the phone\u2019s security protections through the secure boot chain, which is a core startup process that runs at the highest privilege level before the operating system loads. Subsequently, the attacker can recover the device\u2019s PIN, decrypt its storage, and extract the information.<\/p>\n<p>\u201cThis has the potential to affect millions of Android smartphones,\u201d Guillemet added.<\/p>\n<p>Estimates suggest nearly 36 million people manage digital assets on their smartphones, which means that if attackers manage to exploit a vulnerability, it could put a large number of wallets at risk.\u00a0<\/p>\n<p>Guillemet advised using devices with dedicated secure elements that are built for key protection and can safeguard sensitive data even under physical attack.<\/p>\n<p>The Ledger team also detailed a separate attack it tested on MediaTek Dimensity 7300 processors (MT6878) in December, where the team used electromagnetic fault injection to disrupt the chip\u2019s boot process. It allowed them to bypass security checks and ultimately gain full control over the smartphone at the highest privilege level.<\/p>\n<p>As covered by crypto.news on several occasions, crypto users have been targeted across multiple platforms, including iOS, macOS, and Windows.<\/p>\n<p>While Android devices are often easier to compromise due to Google\u2019s more open ecosystem and flexible app distribution model, Apple\u2019s iOS devices have also developed unique attack vectors that target users through malicious frameworks embedded inside otherwise legitimate apps.<\/p>\n<p>For instance, last year, security researchers <a href=\"https:\/\/crypto.news\/over-13k-android-and-ios-crypto-wallets-compromised-by-malicious-app-slowmist\/\" target=\"_blank\">discovered a malicious app<\/a> that infiltrated both iOS and Android devices by requesting file access and subsequently scanning device storage to extract wallet data. Although not as technically severe in nature as hardware-level exploits, the scheme still managed to steal more than $1.8 million in cryptocurrency.<\/p>\n<p>Around the same time, Kaspersky <a href=\"https:\/\/crypto.news\/kaspersky-warns-of-sparkcat-malware-that-targets-private-keys-on-android-and-ios\/\" target=\"_blank\">flagged a malware campaign<\/a> that spread through malicious software development kits embedded in seemingly harmless apps.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/crypto.news\/mediatek-chip-flaw-exposed-crypto-wallets-and-passwords-without-booting-android\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers at Ledger have discovered a major flaw in some Android smartphone chips that lets an attacker siphon encrypted user data like passwords and private keys in a matter of seconds using just a USB connection. Summary Ledger\u2019s Donjon security team discovered a vulnerability in MediaTek and Trustonic TEE chips that could allow attackers [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":18208,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[23],"tags":[],"kronos_expire_date":[],"class_list":["post-18207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto"],"_links":{"self":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/18207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/comments?post=18207"}],"version-history":[{"count":0,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/18207\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/media\/18208"}],"wp:attachment":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/media?parent=18207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/categories?post=18207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/tags?post=18207"},{"taxonomy":"kronos_expire_date","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/kronos_expire_date?post=18207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}