Skip to main content

Archived Article — The Daily Perspective is no longer active. This article was published on 11 March 2026 and is preserved as part of the archive. Read the farewell | Browse archive

Technology

Critical Android flaw puts 25% of phones at risk of crypto theft

MediaTek vulnerability could compromise wallet seed phrases in minutes, affecting budget phone users globally

Critical Android flaw puts 25% of phones at risk of crypto theft
Image: ZDNet
Key Points 2 min read
  • Ledger researchers found a critical vulnerability in MediaTek secure boot affecting about 25% of Android phones, particularly budget models
  • Attackers with physical USB access can extract crypto wallet seed phrases and device PINs in approximately 45 seconds
  • The flaw exploits MediaTek's secure boot chain, allowing offline decryption of full-disk encryption keys before the operating system loads
  • Affected devices include those using MediaTek chips and Trustonic Trusted Execution Environment; users should enable physical security and update firmware

Australian device owners should be aware of a critical security vulnerability that threatens billions of smartphones globally. Ledger's security team has identified a vulnerability in the firmware of Android phones using MediaTek processors that could enable an attacker to extract a device's PIN and the private keys for several crypto wallets in under a minute. Researchers estimate the vulnerability may affect about 25% of Android phones, including some manufacturers using MediaTek chips and Trustonic's Trusted Execution Environment.

The attack exploits a fundamental weakness in hardware security architecture. The vulnerability exploits weaknesses in MediaTek's secure boot chain, allowing attackers to connect the phone via USB and extract the keys protecting Android's full disk encryption before the operating system loads, then decrypt the storage offline. This means an attacker does not need sophisticated software exploits or malware; they only need brief physical access to a device.

In a proof-of-concept test, the exploit recovered sensitive wallet data from apps including Trust Wallet, Kraken Wallet and Phantom. For cryptocurrency users, the implications are stark. Wallet seed phrases, the 12 or 24 words that grant complete access to your crypto, are especially vulnerable, and once attackers have your seed phrase, they control your entire wallet. This risk extends beyond digital assets; the attack also compromises any sensitive personal data stored on the device.

The vulnerability primarily affects budget and mid-range Android devices, which dominate emerging markets where cryptocurrency adoption is growing rapidly. These devices often face longer delays in receiving security updates or may never receive patches from manufacturers. The trade-off between affordability and security infrastructure creates a structural disadvantage for users of lower-cost phones.

Ledger's research team, known for identifying Android security flaws, published their findings to give the industry time to address the issue. While the vulnerability can be patched, the researchers noted that it shows the challenge of storing secrets on non-secure devices and that if crypto sits on a phone, it's only as safe as the weakest link in that phone's hardware, firmware, or software.

For users with cryptocurrency holdings on Android devices, the security recommendation is unambiguous. Hardware wallets remain the safest option because they never display seed phrases on internet-connected devices, with private keys staying isolated in the hardware device, signing transactions without exposing sensitive information to your phone or computer. For those without hardware wallets, keeping seed phrases entirely offline and away from any connected device is essential.

Sources (4)
Zara Mitchell
Zara Mitchell

Zara Mitchell is an AI editorial persona created by The Daily Perspective. Covering global cyber threats, data breaches, and digital privacy issues with technical authority and accessible writing. As an AI persona, articles are generated using artificial intelligence with editorial quality controls.