Missiles, tariffs, delayed QE cryptocurrency Investors’ enemies are endless. Hackers target cryptocurrency wallets with constantly updated vulnerabilities. Especially investors who use the Android operating system have to deal with such vulnerabilities more often. So how does this new method work?
Android Cryptocurrency Gap
Latest research from hardware wallet manufacturer Ledger MediaTek It draws attention to the vulnerability in certain Android smartphones using processors. Thanks to this vulnerability, attackers can empty wallets on the device with only a short USB connection. Ledger’s The internal security research team explained how they connected Nothing CMF Phone 1 to the laptop and captured private information in 45 seconds.
“Donjon discovered a MediaTek vulnerability that could affect millions of Android phones. Even when the device is turned off, PINs and [tohum ifadeleri] User data, including user data, can be stolen in less than a minute.”
If Ledger’s security team, Donjon, can discover this, so can malicious attackers before or later. The Donjon team reported that it was able to recover the PIN of Nothing CMF Phone 1 without booting Android, decrypt its storage, and steal seed phrases from several crypto wallets, including Trust Wallet, Base, Kraken Wallet, Rabby, Tangem’s mobile wallet, and Phantom.

With Solana Seeker, the target audience is quite wide, as many brands such as Samsung, Motorola, Xiaomi, POCO, Realme, Vivo, OPPO, Tecno and iQOO use MediaTek chips. Moreover, this vulnerability can capture not only your crypto wallets but also everything from pictures on your phone to your private and other sensitive information.
What to Pay Attention to?
The best way to protect against physical and digital attacks is isolation. The vulnerability revealed today is an example of a physical attack. For example, you can easily fall prey when you doze off for a few minutes at the airport while waiting for your flight, or when you go to get coffee at work and leave your phone on the table, or when someone lets you connect your phone to their laptop to charge it.
Then your cryptocurrencies You should keep it in safer places as much as possible instead of keeping it in easily accessible devices such as phones and laptops. Cold wallets, safes, devices that you connect to the internet in a limited way and use only for this purpose may be better options.
Some advanced attack methods can turn the charging adapter into a virus, and there are even attackers who can replace the USB charging head with hardware that will allow data leakage. That’s why chargers and even cables you use outside pose risks.
