Homepage Smartphone Android flaw lets hackers unlock data in minutes, researchers warn

Android flaw lets hackers unlock data in minutes, researchers warn

Phone hacking
Shutterstock

Security researchers have uncovered a vulnerability affecting millions of Android devices that could allow attackers to extract sensitive data in under a minute.

Others are reading now

Security researchers have uncovered a vulnerability affecting millions of Android devices that could allow attackers to extract sensitive data in under a minute.

The findings highlight growing concerns about how securely smartphones store personal and financial information.

Exploit uncovered

Researchers from Ledger’s Donjon security team discovered the flaw, TechRadar reported, affecting Android smartphones powered by MediaTek chips using Trustonic’s Trusted Execution Environment.

The team demonstrated the attack on a Nothing CMF Phone 1, bypassing the Android operating system entirely to access protected data.

They were able to recover device PINs, decrypt storage and extract cryptocurrency wallet seed phrases.

Also read

How the attack works

The researchers found that attackers can connect to a powered-down phone via USB and retrieve root cryptographic keys before the operating system loads.

Once obtained, those keys allow offline decryption of stored data and enable brute-force attacks on device PINs.

This can expose messages, photos and sensitive financial information without any user interaction.

Scale of risk

The vulnerability affects devices using the MediaTek and Trustonic combination, which is present in roughly one-quarter of Android smartphones worldwide.

The flaw, identified as CVE-2025-20435, was disclosed after a standard 90-day reporting process.

Also read

MediaTek said it issued fixes to manufacturers in January 2026, allowing updates to be rolled out to affected devices.

Security concerns

The research adds to ongoing concerns about smartphone security, particularly for users storing sensitive data such as cryptocurrency wallets.

“This research proves what we’ve long warned: smartphones were never designed to be vaults. While this can be patched, and we encourage all users to update with the latest security fixes,” said Charles Guillemet, chief technology officer at Ledger.

“If your crypto sits on a phone, it’s only as safe as the weakest link in that phone’s hardware, firmware, or software.”

What users should do

Experts say installing the latest security updates is critical to reducing risk, as patched firmware can block known exploits.

Also read

The findings also underline the limits of relying solely on smartphones to store highly sensitive data.

As mobile devices become more central to daily life, hardware-level vulnerabilities remain a significant challenge for both manufacturers and users.

Sources: TechRadar, Ledger Donjon, MediaTek

Ads by MGDK