News
  • Steve Muchoki
    author-profile
    Steve Muchoki right arrow
    Author

    Steve is a crypto news writer with a passion for decoding market moves. He blends breaking blockchain news with sharp technical analysis and bold price predictions. From Bitcoin rallies to altcoin breakouts, Steve breaks it all down with clarity and insight. Whether you're a trader or just curious, his analysis keeps you ahead of the curve.

    • 1 minute read

    Ledger Reveals Android Flaw Targeting Crypto Seed Phrases

    Story Highlights
    • Ledger researchers have discovered an Android OS vulnerability allowing theft of crypto seed phrases in seconds.

    • The unit applied proof-of-concept to prove the above threat is real.

    • The development shows that smartphones do not possess the security shields necessary to act as crypto storage facilities.

    Ledger’s Donjon research team has identified security vulnerabilities in MediaTek processors (commonly used on Android phones) that allow malicious actors to steal users’ phone pins and their crypto seed phrases within seconds. The attack is said to occur even when devices are switched off.

    The team conducted a proof-of-concept test, where they successfully obtained sensitive information pertaining to several software (a.k.a hot) crypto wallets. Victims included Trust Wallet, Kraken Wallet, and Phantom.

    Crypto theft on Android OS

    Charles Guillemet, the Chief Technology Officer at Ledger hardware wallet company, noted the development as a “reminder that smartphones aren’t built for security.”

    Guillemet added that it could have affected “millions” of Android phones, since they dominate global use due to economic and availability factors.

    Following the report, MediaTek took action to fix the bug, while Trust Wallet introduced a new security feature preventing crypto address tampering.

    Which method of storage is safe?

    Hardware/cold wallets, such as Ledger and Trezor, have gained a reputation for providing better security to cryptocurrencies as compared to software wallets. This is because they utilize chips that are separate from the phone’s main processor.

    Still, at 78% global use, hot wallets are the dominant choice among crypto holders due to their cost efficiency and ease of use.

    Even then, users of cold storage have fallen victim to crypto theft through social engineering, supply chain tampering, physical device extraction, and blatant recklessness. 

    A good example of the latter is the South Korean Tax Service, which accidentally posted the seed phrase to a seized crypto hard wallet. An example of brute force or wrench attacks is the recent case of the French couple who were robbed of almost $1 million in Bitcoin. 

    As for operating systems, iOS users have not been fully spared, with the Coruna vulnerability mining sensitive cryptocurrency information on older iOS versions.

    User keys can still be stolen when running a node, so perhaps multisig wallets are one of the most “fireproof” methods of storing cryptocurrencies.

    Trust with CoinPedia:

    CoinPedia has been delivering accurate and timely cryptocurrency and blockchain updates since 2017. All content is created by our expert panel of analysts and journalists, following strict Editorial Guidelines based on E-E-A-T (Experience, Expertise, Authoritativeness, Trustworthiness). Every article is fact-checked against reputable sources to ensure accuracy, transparency, and reliability. Our review policy guarantees unbiased evaluations when recommending exchanges, platforms, or tools. We strive to provide timely updates about everything crypto & blockchain, right from startups to industry majors.

    Investment Disclaimer:

    All opinions and insights shared represent the author's own views on current market conditions. Please do your own research before making investment decisions. Neither the writer nor the publication assumes responsibility for your financial choices.

    Sponsored and Advertisements:

    Sponsored content and affiliate links may appear on our site. Advertisements are marked clearly, and our editorial content remains entirely independent from our ad partners.

    Show More

    Related Articles

    Back to top button