The post Ledger Flags Unpatchable MediaTek Chip Flaw Risking Crypto appeared on BitcoinEthereumNews.com. Ledger Donjon shows EM pulses can break MediaTek Dimensity 7300 boot ROM Attackers gain EL3 control within minutes once the timing window is mapped Ledger says smartphone wallets face lasting risk and need secure-element hardware Security researchers at Ledger have identified a critical, unpatchable vulnerability in the silicon architecture of MediaTek’s Dimensity 7300 processor, effectively shattering the “Root of Trust” for millions of Android devices.  The findings, published by Ledger’s Donjon unit, detail a hardware-level exploit that allows attackers to bypass all security layers and seize control of the device’s most privileged execution mode.  The ‘Silicon Permanence’ Problem The vulnerability resides in the Boot ROM, the immutable “read-only” code baked into the processor during manufacturing. Because this code is etched into the silicon, it cannot be altered or patched by over-the-air (OTA) software updates. The investigation focused on the MediaTek MT6878, a 4 nanometer system on chip used in numerous Android handsets. According to the report, the vulnerability resides in the processor’s boot ROM, a read only component that drives the initial startup sequence. Because that logic is baked into silicon and cannot be rewritten, the defect remains permanent for devices built on the affected chip. Related: Ledger Exposes Potential Security Flaw in Trezor Wallets During testing, researchers applied short electromagnetic pulses at carefully measured intervals during the boot process. This interference allowed them to bypass memory-access protections and elevate execution to EL3, the top privilege tier in the ARM architecture. Once the timing window was identified, each laboratory attempt took roughly one second and succeeded between 0.1% and 1% of the time, enabling a complete compromise in minutes. Unpatchable Flaw Undermines Smartphone Wallet Security The research details how such attacks could weaken smartphone based private key storage even further. The team noted that users already face threats from malware,… The post Ledger Flags Unpatchable MediaTek Chip Flaw Risking Crypto appeared on BitcoinEthereumNews.com. Ledger Donjon shows EM pulses can break MediaTek Dimensity 7300 boot ROM Attackers gain EL3 control within minutes once the timing window is mapped Ledger says smartphone wallets face lasting risk and need secure-element hardware Security researchers at Ledger have identified a critical, unpatchable vulnerability in the silicon architecture of MediaTek’s Dimensity 7300 processor, effectively shattering the “Root of Trust” for millions of Android devices.  The findings, published by Ledger’s Donjon unit, detail a hardware-level exploit that allows attackers to bypass all security layers and seize control of the device’s most privileged execution mode.  The ‘Silicon Permanence’ Problem The vulnerability resides in the Boot ROM, the immutable “read-only” code baked into the processor during manufacturing. Because this code is etched into the silicon, it cannot be altered or patched by over-the-air (OTA) software updates. The investigation focused on the MediaTek MT6878, a 4 nanometer system on chip used in numerous Android handsets. According to the report, the vulnerability resides in the processor’s boot ROM, a read only component that drives the initial startup sequence. Because that logic is baked into silicon and cannot be rewritten, the defect remains permanent for devices built on the affected chip. Related: Ledger Exposes Potential Security Flaw in Trezor Wallets During testing, researchers applied short electromagnetic pulses at carefully measured intervals during the boot process. This interference allowed them to bypass memory-access protections and elevate execution to EL3, the top privilege tier in the ARM architecture. Once the timing window was identified, each laboratory attempt took roughly one second and succeeded between 0.1% and 1% of the time, enabling a complete compromise in minutes. Unpatchable Flaw Undermines Smartphone Wallet Security The research details how such attacks could weaken smartphone based private key storage even further. The team noted that users already face threats from malware,…

Ledger Flags Unpatchable MediaTek Chip Flaw Risking Crypto

2025/12/05 04:59
  • Ledger Donjon shows EM pulses can break MediaTek Dimensity 7300 boot ROM
  • Attackers gain EL3 control within minutes once the timing window is mapped
  • Ledger says smartphone wallets face lasting risk and need secure-element hardware

Security researchers at Ledger have identified a critical, unpatchable vulnerability in the silicon architecture of MediaTek’s Dimensity 7300 processor, effectively shattering the “Root of Trust” for millions of Android devices. 

The findings, published by Ledger’s Donjon unit, detail a hardware-level exploit that allows attackers to bypass all security layers and seize control of the device’s most privileged execution mode. 

The ‘Silicon Permanence’ Problem

The vulnerability resides in the Boot ROM, the immutable “read-only” code baked into the processor during manufacturing. Because this code is etched into the silicon, it cannot be altered or patched by over-the-air (OTA) software updates.

The investigation focused on the MediaTek MT6878, a 4 nanometer system on chip used in numerous Android handsets. According to the report, the vulnerability resides in the processor’s boot ROM, a read only component that drives the initial startup sequence. Because that logic is baked into silicon and cannot be rewritten, the defect remains permanent for devices built on the affected chip.

Related: Ledger Exposes Potential Security Flaw in Trezor Wallets

During testing, researchers applied short electromagnetic pulses at carefully measured intervals during the boot process. This interference allowed them to bypass memory-access protections and elevate execution to EL3, the top privilege tier in the ARM architecture. Once the timing window was identified, each laboratory attempt took roughly one second and succeeded between 0.1% and 1% of the time, enabling a complete compromise in minutes.

Unpatchable Flaw Undermines Smartphone Wallet Security

The research details how such attacks could weaken smartphone based private key storage even further. The team noted that users already face threats from malware, remote exploitation and supply chain issues, and that a hardware level weakness expands the surface that determined attackers can probe. The report adds that digital wallet applications on consumer phones are exposed because they rely on general purpose components that were never engineered to resist hands on electrical fault attacks.

A cryptocurrency wallet functions by holding a user’s public and private keys and facilitating asset transfers. Software wallets operate on devices connected to the internet, while hardware wallets store keys offline within dedicated secure elements designed to withstand both physical and digital intrusion attempts.

In comments included within the report, MediaTek stated that electromagnetic fault-injection attacks were outside the intended security scope for the MT6878, noting that the chipset was designed for mass-market electronics rather than high-security systems. The company added that products requiring elevated protection, such as hardware wallets, should incorporate countermeasures specifically built for EMFI resistance.

Ledger’s team concluded that devices based on the MT6878 remain exposed because the underlying flaw is embedded in unmodifiable silicon. They added that secure-element components remain essential for individuals who depend on self-custody or conduct sensitive cryptographic operations, since smartphones cannot reasonably exclude hardware attack scenarios.

Related: Apple MacOS/iOS Security Flaw: CZ Warns Crypto Users at Risk

Disclaimer: The information presented in this article is for informational and educational purposes only. The article does not constitute financial advice or advice of any kind. Coin Edition is not responsible for any losses incurred as a result of the utilization of content, products, or services mentioned. Readers are advised to exercise caution before taking any action related to the company.

Source: https://coinedition.com/crypto-wallet-risk-ledger-donjon-exposes-mediatek-chips-security-flaw/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Suspected $243M Crypto Hacker Arrested After Major Breakthrough in Global Heist

Suspected $243M Crypto Hacker Arrested After Major Breakthrough in Global Heist

Major breakthrough in $243M crypto heist as suspect arrested! $18.58M in crypto seized, linked to suspected hacker’s wallet. Dubai villa raid leads to possible arrest of crypto thief. A major breakthrough in the investigation into the $243 million crypto theft has emerged, as blockchain investigator ZachXBT claims that a British hacker, suspected of orchestrating one of the largest individual thefts in crypto history, may have been arrested. On December 5, ZachXBT revealed in a Telegram post that Danny (also known as Meech or Danish Zulfiqar Khan), the primary suspect behind the attack, was likely apprehended by law enforcement. ZachXBT pointed to a significant find: approximately $18.58 million worth of crypto currently sitting in an Ethereum wallet linked to the suspect. The investigator claimed that several addresses connected to Zulfiqar had consolidated funds to this address, mirroring patterns previously seen in law enforcement seizures. This discovery has raised suspicions that authorities may have closed in on the hacker. Moreover, ZachXBT mentioned that Zulfiqar was last known to be in Dubai, where it is alleged that a villa was raided, and multiple individuals associated with the hacker were arrested. He also noted that several contacts of Zulfiqar had gone silent in recent days, adding to the growing belief that law enforcement had made a major move against the hacker. However, no official statements from Dubai Police or UAE regulators have confirmed the arrest, and local media reports remain silent on the matter. Also Read: Song Chi-hyung: The Visionary Behind Upbit and the Future of Blockchain Innovation The $243 Million Genesis Creditor Heist: How the Attack Unfolded The arrest of Zulfiqar may be linked to one of the largest known individual crypto heists. In September 2024, ZachXBT uncovered that three attackers were involved in stealing 4,064 BTC (valued at $243 million at the time) from a Genesis creditor. The attack was carried out using sophisticated social engineering tactics. The hackers impersonated Google support to trick the victim into resetting two-factor authentication on their Gemini account, giving them access to the victim’s private keys. From there, they drained the wallet, moving the stolen BTC through a complex network of exchanges and swap services. ZachXBT previously identified the suspects by their online handles, “Greavys,” “Wiz,” and “Box,” later tying them to individuals Malone Lam, Veer Chetal, and Jeandiel Serrano. The U.S. Department of Justice later charged two of the suspects with orchestrating a $230 million crypto scam involving the theft. Further court documents revealed that the criminals had used a mix of SIM swaps, social engineering, and even physical burglaries to carry out the theft, spending millions on luxury items like cars and travel. ZachXBT’s tracking work has played a key role in uncovering several related thefts, including a $2 million scam in which Chetal was involved while out on bond. The news of Zulfiqar’s potential arrest could mark a significant turning point in the investigation, although full details are yet to emerge. Also Read: Kevin O’Leary Warns: Only Bitcoin and Ethereum Will Survive Crypto’s Reality Check! The post Suspected $243M Crypto Hacker Arrested After Major Breakthrough in Global Heist appeared first on 36Crypto.
Share
Coinstats2025/12/06 18:27