Hackers can steal Android PINs and crypto pockets knowledge even when telephones are switched off, exposing thousands and thousands globally



  • Ledger’s Donjon crew exploited MediaTek telephones, recovering PINs and crypto pockets seed phrases
  • Attackers can extract root cryptographic keys from switched-off Android units by way of USB
  • Trustonic’s Trusted Execution Surroundings fails to forestall assaults on one-quarter of Android units

Ledger’s white-hat hacking crew, the Donjon, found a vulnerability in MediaTek-powered Android smartphones which permits attackers to entry delicate knowledge in underneath a minute.

Utilizing a Nothing CMF Telephone 1, the Donjon bypassed the Android working system fully, recovered the PIN, decrypted storage, and extracted seed phrases from a number of crypto wallets.


👇Observe extra 👇
👉 bdphone.com
👉 ultractivation.com
👉 trainingreferral.com
👉 shaplafood.com
👉 bangladeshi.help
👉 www.forexdhaka.com
👉 uncommunication.com
👉 ultra-sim.com
👉 forexdhaka.com
👉 ultrafxfund.com
👉 bdphoneonline.com
👉 dailyadvice.us

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top