The post Ledger Reveals Android Flaw Targeting Crypto Seed Phrases appeared first on Coinpedia Fintech News
Ledger’s Donjon research team has identified security vulnerabilities in MediaTek processors (commonly used on Android phones) that allow malicious actors to steal users’ phone pins and their crypto seed phrases within seconds. The attack is said to occur even when devices are switched off.
The team conducted a proof-of-concept test, where they successfully obtained sensitive information pertaining to several software (a.k.a hot) crypto wallets. Victims included Trust Wallet, Kraken Wallet, and Phantom.
Crypto theft on Android OS
Charles Guillemet, the Chief Technology Officer at Ledger hardware wallet company, noted the development as a “reminder that smartphones aren’t built for security.”
Guillemet added that it could have affected “millions” of Android phones, since they dominate global use due to economic and availability factors.
Following the report, MediaTek took action to fix the bug, while Trust Wallet introduced a new security feature preventing crypto address tampering.
Which method of storage is safe?
Hardware/cold wallets, such as Ledger and Trezor, have gained a reputation for providing better security to cryptocurrencies as compared to software wallets. This is because they utilize chips that are separate from the phone’s main processor.
Still, at 78% global use, hot wallets are the dominant choice among crypto holders due to their cost efficiency and ease of use.
Even then, users of cold storage have fallen victim to crypto theft through social engineering, supply chain tampering, physical device extraction, and blatant recklessness.
A good example of the latter is the South Korean Tax Service, which accidentally posted the seed phrase to a seized crypto hard wallet. An example of brute force or wrench attacks is the recent case of the French couple who were robbed of almost $1 million in Bitcoin.
As for operating systems, iOS users have not been fully spared, with the Coruna vulnerability mining sensitive cryptocurrency information on older iOS versions.
User keys can still be stolen when running a node, so perhaps multisig wallets are one of the most “fireproof” methods of storing cryptocurrencies.


