Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
    ExclusiveShow More
    CLARITY Act Clears Senate Banking Committee 15-9 Here’s What Every Crypto Leader Is Saying
    CLARITY Act Clears Senate Banking Committee 15-9: Here’s What Every Crypto Leader Is Saying
    GENIUS Act stablecoin regulation 2026 — US Treasury, OCC, FDIC and NCUA rulemaking on federal vs state oversight
    GENIUS Act at 10 Months: Inside America’s New Stablecoin Rulebook
    $10.8 Million Drained Inside the THORChain Exploit That Froze Cross-Chain DeFi for 13 Hours
    $10.8 Million Drained: Inside the THORChain Exploit That Froze Cross-Chain DeFi for 13 Hours
    BG Wealth and DSJ Exchange collapse exposes 2026 crypto scam pipeline
    How BG Wealth and DSJ Exposed the New Pipeline Model Behind 2026 Crypto Fraud
    Chainalysis’ Regional Director on Asia’s Crypto Growth and Stablecoin Revolution
    Exclusive: Chainalysis’ Regional Director on Asia’s Crypto Growth and Stablecoin Revolution
  • Opinion
    OpinionShow More
    The CLARITY Act The Final Hand — Everyone's Bluffing, Nobody's Folding, and Thursday Changes Everything
    The CLARITY Act: The Final Hand — Everyone’s Bluffing, Nobody’s Folding, and Thursday Changes Everything
    WazirX Debuts ‘Guardians of Trust’ Hub Security Pivot or Distraction from the 15% Debt
    WazirX Debuts ‘Guardians of Trust’ Hub: Security Pivot or Distraction from the 15% Debt?
    What Does Bitcoin Become in a World Questioning the Dollar?
    What Does Bitcoin Become in a World Questioning the Dollar?
    What Happens to the One Asset Designed to Escape Control
    What Happens to the One Asset Designed to Escape Control?
    A System Built on Control, and a Question That Refuses to Settle
    A System Built on Control, and a Question That Refuses to Settle
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
Industry

Ledger Finds Android Flaw That Could Expose Crypto Wallet Keys

The flaw was found by Ledger’s Donjon security research team, which discovered a weakness in the secure boot chain of MediaTek chips.

Written By:
Iyiola Adrian

Reviewed By:
Jahnu Jagtap

Last updated: March 12, 2026 1:14 AM
Published March 12, 2026 1:14 AM
Share
Last updated: March 12, 2026 1:14 AM
Published March 12, 2026 1:14 AM
Ledger Finds Android Flaw That Could Expose Crypto Wallet Keys

Key Highlights

  • Ledger researchers found a security flaw in some Android phones that could let attackers steal crypto wallet private keys in under a minute.
  • An attacker can connect the device through USB before it fully starts and extract the encryption keys that protect the phone’s storage.
  • The issue could affect about 25% of Android devices, especially phones using MediaTek processors.

Ledger has discovered a serious security issue affecting some Android smartphones that use MediaTek processors. The flaw could reportedly allow someone with the phone in their hands to steal the PIN and private keys for crypto wallets in less than a minute. 

In a detailed X thread on Wednesday, Ledger CTO Charles Guillemet said that the Donjon research team, which tests hardware and software security, found a weakness in the phone’s secure boot process, a system that checks the software when the phone starts.

🚨 @DonjonLedger has struck again discovering a MediaTek vulnerability potentially impacting millions of Android phones. Another reminder that smartphones aren’t built for security. Even when powered off, user data – including pins & seeds – can be extracted in under a minute.

— Charles Guillemet (@P3b7_) March 11, 2026

If someone connects the phone to another device with a USB cable before the operating system fully loads, they could take the encryption keys that protect the phone’s storage. They could then unlock the storage offline and access private information, including wallet data.

How the phone security flaw works

According to the research team, the flaw could affect around 25% of Android phones. The phones most at risk are those that use MediaTek chips together with a secure system from Trustonic.

Ledger said this shows that phones were not made to store secrets like crypto keys. Users should update their phones with the latest security fixes from MediaTek and phone makers to protect themselves. The team shared this research so developers and manufacturers have time to fix the problem before bad people try to steal keys.

“We undertake this work not to create fear, but so the industry can fix the vulnerability before attackers take advantage,” Guillemet said. 

Rising attacks on personal crypto wallets

The discovery comes as attacks on personal crypto wallets continue to increase. A recent TRM Labs report shows that thefts like private-key hacks, seed-phrase steals, and website hijacks made up more than 80% of the $2.1 billion lost in crypto in the first half of 2025. 

Overall, more than $3.41 billion was stolen in 2025, with personal wallet compromises rising sharply from 7.3% of stolen value in 2022 to 44% in 2024, affecting more than 158,000 cases.

Similar warning from Ledger researchers before

Meanwhile, Ledger had warned about similar problems before. In December 2025, its researchers found that the MediaTek Dimensity 7300 chip had a hardware weakness that allows attackers to bypass security checks using electromagnetic fault injection.

This lets hackers control the memory, boot, and security settings of the device. This, in turn, compromises the security of the stored crypto keys. The flaw cannot be fixed via software updates, as it is a hardware flaw. Even though each attack attempt succeeds only a small percentage of the time, it can be repeated quickly, making a breach possible within minutes.

The company explained that smartphones, even the most advanced ones, are not safe for storing private keys. Smartphones can be stolen or grabbed. If attackers can control the early boot components of the phone, they can essentially control the entire phone.

Also Read: North Korea-Linked Hackers Target Crypto Supply Chain in Cloud Breach

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

TAGGED:Crypto Hack
Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Iyiola - Crypto Journalist at The Crypto Times
By Iyiola Adrian
Follow:
Iyiola is an experienced crypto writer specializing in simplifying complex blockchain and cryptocurrency topics for a broad audience. With expertise in ICOs, DeFi, NFTs, and regulatory updates, he offers valuable insights to help readers make informed decisions.
Jahnu Jagtap - Crypto Research Analyst at The Crypto Times
By Jahnu Jagtap
Follow:

Jahnu Jagtap is a Research Analyst with over 5 years of experience in crypto, finance, fintech, blockchain, Web3, and AI. He holds a BSc in Mathematics and is certified in Blockchain and Its Applications (SWAYAM MHRD), Cryptocurrency (Upskillist), and NISM Certifications. Jahnu specializes in technical, on-chain, and fundamental analysis, while also closely tracking global macro trends, regulations, lawsuits, and U.S. equities. With a strong analytical background and editorial insight, he drives content that delivers clarity and depth in the fast-evolving world of digital finance.

Latest News

OKX Opens U.S. Access to Pi Network, Expanding Market Reach
OKX Opens U.S. Access to Pi Network, Expanding Market Reach
Kraken Expands into Dubai with VARA Regulatory Approval
Kraken Expands into Dubai with VARA Regulatory Approval
Blockchain.com Moves Toward IPO with Confidential SEC Filing
Blockchain.com Moves Toward IPO with Confidential SEC Filing
Crypto PAC Launches 2026 Midterm Push as ‘Crypto Mom’ Hester Pierce Exits SEC
Crypto PAC Launches 2026 Midterm Push as ‘Crypto Mom’ Hester Pierce Exits SEC
Bitcoin Pizza Day celebration campaign by Binance
Binance Marks Bitcoin Pizza Day With New WOTD Campaign

Find Us on Socials

You may also like

Bank of America Discloses Over $2.2 Billion in Crypto-Related Holdings

Bank of America Discloses Over $2.2 Billion in Crypto-Related Holdings

Boerse Stuttgart, Societe Generale, and flatexDEGIRO Partner for Tokenized Securities Settlement Platform

Boerse Stuttgart, Societe Generale, and flatexDEGIRO Partner for Tokenized Securities Settlement Platform

RedotPay Sets Up Local Entity in Bhutan’s GMC for Stablecoin Payments

RedotPay Sets Up Local Entity in Bhutan’s GMC for Stablecoin Payments

THORChain Shares Exploit Report Revealing $10.7M Vault Breach by New Node

THORChain Shares Exploit Report Revealing $10.7M Vault Breach by New Node

The Crypto Times Logo PNG

Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

Stay Updated

All News
Exclusive
Opinions
Learn
Podcasts

Company

About Us
Our Authors
Editorial Policy
AI Policy
Advertorial Policy

Get In Touch

Contact Us
Career

Find Us on Socials

X-twitter Linkedin Telegram Youtube Instagram

© 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

DMCA.com Protection Status
  • Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Cookie policy
Do Not Sell or Share My Personal Information