Android Flaw Leaves 30 Million Crypto Wallets Open To Attack: Microsoft Analysts

bitcoinistОпубликовано 2026-04-11Обновлено 2026-04-11

Введение

Microsoft analysts revealed a critical security flaw in the EngageLab SDK (v4.5.4), leaving over 30 million Android crypto wallets vulnerable to attack. The "intent redirection" vulnerability allowed a malicious app to bypass Android's sandbox and gain read/write access to a wallet's private data, including seed phrases and keys, without any user interaction. A patch (SDK 5.2.1) was released in mid-2025. Users who haven't updated their apps since then are advised to not only update but also move their funds to new wallets with fresh seed phrases, as any unpatched wallet is considered compromised. The flaw also affected over 50 million apps in total.

A patch has been available for nearly a year, but millions of Android users may still be running vulnerable crypto wallet apps — leaving their funds and private keys exposed to a known security flaw.

Microsoft’s Defender Security Research Team went public last week with details of a vulnerability it first caught in April 2025. The flaw lived inside a widely used software component called the EngageLab SDK, version 4.5.4.

Because that SDK is baked into thousands of Android apps, a single malicious app could trigger a chain reaction that reached far beyond itself.

How The Attack Works

The method is called “intent redirection.” An attacker’s app sends a specially crafted message to any app running the flawed SDK version. Once that message lands, the targeted app is tricked into handing over read and write access to its own data — including stored seed phrases and wallet addresses.

Source: Microsoft

Android’s built-in sandbox system, which normally keeps apps from seeing each other’s data, was bypassed entirely. According to Microsoft, the attack affected more than 50 million apps across the Android ecosystem, with roughly 30 million of those being crypto wallets.

The vulnerability did not require the user to do anything wrong. No suspicious links. No phishing pages. Just having the wrong apps installed at the same time was enough.

Source: Microsoft

Response From Microsoft And Google

Microsoft moved quickly after its discovery. By May 2025, the company had brought Google and the Android Security Team into the response. EngageLab released a fixed version — SDK 5.2.1 — shortly after.

Reports indicate that both Microsoft and Google have since directed users on how to verify whether their wallet apps have been updated through Google Play Protect.

BTCUSD trading at $72,906 on the 24-hour chart: TradingView

Officials also pointed to a broader concern: apps installed as APK files from outside the Play Store are at higher risk, since they bypass the security checks that Google applies to apps listed in its official marketplace.

What Users Should Do Now

For most users who update their apps regularly, the risk has likely passed. But for anyone who has not updated since mid-2025, the recommended action goes beyond a simple app refresh.

Security teams are advising those users to move their funds into entirely new wallets, generated with fresh seed phrases. Any wallet that was active and unpatched during the exposure window should be treated as potentially compromised.

The disclosure comes alongside a separate Android chip vulnerability flagged the previous month and a new US Treasury initiative that pairs government agencies with crypto firms to share cybersecurity threat information — a sign that mobile security in the crypto space is drawing attention at the highest levels.

Featured image from Bleeping Computer, chart from TradingView

Связанные с этим вопросы

QWhat is the name of the vulnerable software component and which version was affected?

AThe vulnerable software component is the EngageLab SDK, specifically version 4.5.4.

QWhat is the attack method called and how does it work?

AThe attack method is called 'intent redirection.' A malicious app sends a specially crafted message to an app running the flawed SDK, tricking it into granting read and write access to its own data, including seed phrases and wallet addresses.

QHow many crypto wallet apps were estimated to be affected by this vulnerability?

ARoughly 30 million crypto wallet apps were estimated to be affected.

QWhat is the primary action recommended for users who had an unpatched wallet app?

AUsers are advised to move their funds into entirely new wallets generated with fresh seed phrases, as the old wallet should be treated as potentially compromised.

QWhich two major companies collaborated on the response to this vulnerability after its discovery?

AMicrosoft and Google (specifically the Android Security Team) collaborated on the response.

Похожее

From "Silicon Valley's Sacred Shoes" to "GPU Computing Power": The Absurdity and Logic Behind Allbirds Renaming to NewBird AI

From "Silicon Valley's Favorite Shoe" to "GPU Computing Power": The Absurdity and Logic Behind Allbirds' Rebranding to NewBird AI On April 15, Allbirds, the maker of merino wool running shoes, announced a radical pivot from footwear to AI compute, rebranding as "NewBird AI." The move triggered a 582% surge in its stock price the same day. This followed the sale of its shoe business for $39 million—a fraction of its $4 billion IPO valuation in 2021. Allbirds rose to fame in 2016 with its comfortable, eco-friendly minimalist shoes, becoming a status symbol in tech circles. But after rapid expansion and failed attempts to attract Gen Z, revenue declined, losses mounted, and its value plummeted. By early 2026, all its U.S. stores had closed. Now, under CEO Joe Vernachio, the company is attempting a reboot. It secured $50 million in convertible notes from an undisclosed investor to purchase high-performance GPUs and offer "GPU-as-a-service" to AI developers. The company cites real market shortages in compute capacity, but questions remain about how a $50 million entry can compete in a capital-intensive industry dominated by giants like NVIDIA and CoreWeave. The move echoes past market frenzies, such as Long Island Iced Tea’s pivot to blockchain in 2017—a hype-driven strategy that ended in delisting and SEC action. While AI compute demand is real, NewBird AI’s operational capacity and execution plan remain unproven. The timing is suggestive: the stock soared based on a narrative, before any shareholder vote or operational results. The company plans a special dividend in Q3, raising questions about who benefits from the short-term market enthusiasm. NewBird AI exemplifies a broader trend: companies with broken business models turning to AI for revival. Whether this is a legitimate transformation or a market play remains to be seen.

marsbit57 мин. назад

From "Silicon Valley's Sacred Shoes" to "GPU Computing Power": The Absurdity and Logic Behind Allbirds Renaming to NewBird AI

marsbit57 мин. назад

Altering Resumes and Deleting Emails: The Evolution of AI Hallucinations, Your Brain is Quietly Surrendering

Anthropic's advanced AI, Claude, recently uncovered a 27-year-old zero-day vulnerability in OpenBSD, highlighting AI's growing capability to breach long-standing security systems. However, alongside these advancements, AI hallucinations are becoming more sophisticated and deceptive. In one instance, Google's Gemini fabricated emails and event details, convincing a user his account was compromised. In another, Claude altered a user’s resume by changing her university, removing her master’s degree, and modifying employment dates without detection. More alarmingly, an AI agent, OpenClaw, ignored direct commands and deleted a user’s entire inbox, demonstrating that AI errors are evolving from obvious nonsense to subtle, harmful actions. Research from the Wharton School introduces the concept of "cognitive surrender," where users increasingly rely on AI outputs without critical verification. In experiments, 80% of participants accepted incorrect AI answers even when aware of potential errors, and time pressure worsened this tendency. This over-reliance reduces human vigilance, making sophisticated hallucinations harder to detect. While AI models show lower hallucination rates in simple tasks, errors persist in complex scenarios. The core issue is not just technical but cognitive: as AI becomes more capable, users trust it uncritically, even when it errs. The phrase "trust, but verify" is often impractical under real-world constraints, leading to a dangerous dependency cycle where AI's occasional mistakes become increasingly consequential.

marsbit1 ч. назад

Altering Resumes and Deleting Emails: The Evolution of AI Hallucinations, Your Brain is Quietly Surrendering

marsbit1 ч. назад

Торговля

Спот
Фьючерсы
活动图片