Back to Hub

MediaTek Chip Flaw Exposes Crypto Wallets, PINs on Powered-Off Android Phones

A fundamental security assumption has been shattered: that a powered-off smartphone is a safe smartphone. Security researchers from Ledger's Donjon team have uncovered a critical vulnerability in MediaTek's System-on-a-Chip (SoC) design that allows attackers to bypass all Android security measures and extract PINs, passwords, and crucially, the private keys to cryptocurrency wallets, in approximately 45 seconds. The attack works even when the device is completely turned off, exploiting a hardware-level flaw that grants unfettered access to the device's secure storage.

The vulnerability resides in MediaTek's proprietary diagnostic and testing interface, a feature embedded in the chip's firmware. This interface, intended for manufacturer debugging, can be accessed by booting the device into a special pre-boot mode. Once in this mode, an attacker with physical access to the device can issue commands that dump the contents of critical security partitions, including the "keystore" where Android encrypts sensitive user data. The researchers demonstrated that the extracted encrypted data could then be decrypted offline, revealing the user's lock screen PIN, various app passwords, and—most alarmingly for the crypto community—the seed phrases and private keys stored by mobile cryptocurrency wallets.

The scale of the impact is massive. MediaTek chipsets power roughly 25% of the global Android smartphone market, encompassing hundreds of millions of devices from numerous manufacturers. This makes the flaw one of the most widespread hardware security issues discovered in recent years. The attack requires physical possession of the device, but this is a common scenario in thefts targeting high-value individuals known to hold cryptocurrency assets.

The technical root cause involves an inadequate access control mechanism for the chip's secure boot and debug features. The MediaTek diagnostic mode does not properly validate the integrity of the boot chain or enforce hardware-based security checks before providing deep system access. This allows an attacker to interrupt the normal boot process and command the chip to reveal secrets that are normally protected by the Trusted Execution Environment (TEE) and hardware-backed keystores. The researchers noted that the attack is silent, leaves no obvious trace on the device's main storage, and does not require the attacker to know the user's PIN or password beforehand.

In response to the disclosure by Ledger Donjon, MediaTek has developed and released patches to device manufacturers (OEMs). The fix involves securing the diagnostic interface with proper authentication and hardening the pre-boot environment. However, the patch rollout faces the classic Android fragmentation problem. The responsibility now falls to individual smartphone brands to integrate the patch into their firmware and distribute it via over-the-air (OTA) updates to end-users. This process is notoriously slow and inconsistent, leaving a vast population of devices potentially vulnerable for months or even indefinitely if the device is no longer supported.

For the cybersecurity and cryptocurrency communities, this vulnerability is a stark reminder of the hidden risks in complex hardware supply chains. It underscores that software security, even robust encryption, can be completely undermined by a flaw in the underlying silicon. Security professionals are advised to treat mobile devices with MediaTek chips as having a reduced security posture if not confirmed to be patched. For high-risk users, such as active cryptocurrency traders, the recommendation is to avoid storing seed phrases or large amounts of crypto assets on vulnerable smartphones and to consider using dedicated, purpose-built hardware wallets for cold storage, which are designed to be resilient against such physical attacks.

The MediaTek flaw represents a paradigm shift in threat modeling for mobile devices. It proves that the 'powered-off state' can no longer be considered a safe state against a determined attacker with physical access. This will likely influence future chip design, pushing for stronger hardware-rooted security that protects sensitive data even when the main operating system is completely inactive. For now, vigilance and prompt updating are the primary defenses for millions of Android users worldwide.

Original sources

NewsSearcher

This article was generated by our NewsSearcher AI system, analyzing information from multiple reliable sources.

Уязвимость в чипах MediaTek позволяет взломать Android-смартфон за 45 секунд даже не включая его

3DNews
View source

Уязвимость чипов MediaTek поставила под угрозу криптокошельки на четверти Android

http://forklog.com/
View source

MediaTek chip flaw exposed crypto wallets and passwords without booting Android

Crypto News
View source

MediaTek Patches Bug Allowing Attackers To Steal Crypto Seeds

Cointelegraph
View source

⚠️ Sources used as reference. CSRaid is not responsible for external site content.

This article was written with AI assistance and reviewed by our editorial team.

Comentarios 0

¡Únete a la conversación!

Sé el primero en compartir tu opinión sobre este artículo.