{"id":80499,"date":"2026-04-11T11:01:32","date_gmt":"2026-04-11T11:01:32","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=80499"},"modified":"2026-04-11T11:01:32","modified_gmt":"2026-04-11T11:01:32","slug":"android-flaw-leaves-30-million-crypto-wallets-open-to-attack-microsoft-analysts","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=80499","title":{"rendered":"Android Flaw Leaves 30 Million Crypto Wallets Open To Attack: Microsoft Analysts"},"content":{"rendered":"<div>\n<p>A patch has been available for nearly a year, but millions of Android users may still be running vulnerable <a href=\"https:\/\/www.coingecko.com\/\" target=\"_blank\" rel=\"noopener nofollow\">crypto<\/a> wallet apps \u2014 leaving their funds and private keys exposed to a known security flaw.<\/p>\n<p>Microsoft\u2019s <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/04\/09\/intent-redirection-vulnerability-third-party-sdk-android\/\" target=\"_blank\" rel=\"noopener nofollow\">Defender Security Research<\/a> Team went public last week with details of a vulnerability it first caught in April 2025. The flaw lived inside a widely used software component called the EngageLab SDK, version 4.5.4.<\/p>\n<p>Because that SDK is baked into thousands of Android apps, a single malicious app could trigger a chain reaction that reached far beyond itself.<\/p>\n<h2>How The Attack Works<\/h2>\n<p>The method is called \u201cintent redirection.\u201d An attacker\u2019s app sends a specially crafted message to any app running the <a href=\"https:\/\/securityaffairs.com\/190586\/hacking\/engagelab-sdk-flaw-opens-door-to-private-data-on-50m-android-devices.html\" target=\"_blank\" rel=\"noopener nofollow\">flawed SDK version<\/a>. Once that message lands, the targeted app is tricked into handing over read and write access to its own data \u2014 including stored seed phrases and wallet addresses.<\/p>\n<p><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-675453\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_60b5db.png?resize=686%2C197\" alt=\"\" width=\"686\" height=\"197\" srcset=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_60b5db.png?w=686 686w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_60b5db.png?w=640 640w\" sizes=\"(max-width: 686px) 100vw, 686px\"><\/p>\n<p>Android\u2019s built-in sandbox system, which normally keeps apps from seeing each other\u2019s data, was bypassed entirely. According to Microsoft, the attack affected more than 50 million apps across the Android ecosystem, with roughly 30 million of those being crypto wallets.<\/p>\n<p>The <a href=\"https:\/\/thehackernews.com\/2026\/04\/engagelab-sdk-flaw-exposed-50m-android.html\" rel=\"nofollow noopener\" target=\"_blank\">vulnerability<\/a> did not require the user to do anything wrong. No suspicious links. No phishing pages. Just having the wrong apps installed at the same time was enough.<\/p>\n<p><img loading=\"lazy\" data-recalc-dims=\"1\" decoding=\"async\" class=\"aligncenter size-full wp-image-675452\" src=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_fda125.png?resize=808%2C408\" alt=\"\" width=\"808\" height=\"408\" srcset=\"https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_fda125.png?w=808 808w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_fda125.png?w=640 640w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_fda125.png?w=768 768w, https:\/\/bitcoinist.com\/wp-content\/uploads\/2026\/04\/a_fda125.png?w=750 750w\" sizes=\"auto, (max-width: 808px) 100vw, 808px\"><\/p>\n<h2>Response From Microsoft And Google<\/h2>\n<p>Microsoft moved quickly after its discovery. By May 2025, the company had brought Google and the Android Security Team into the response. <a href=\"https:\/\/www.securityweek.com\/microsoft-finds-vulnerability-exposing-millions-of-android-crypto-wallet-users\/amp\/\" target=\"_blank\" rel=\"noopener nofollow\">EngageLab<\/a> released a fixed version \u2014 SDK 5.2.1 \u2014 shortly after.<\/p>\n<p>Reports indicate that both Microsoft and Google have since directed users on how to verify whether their wallet apps have been updated through Google Play Protect.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full\" src=\"https:\/\/www.tradingview.com\/x\/3oby9jJ7\/\" width=\"1835\" height=\"925\"><\/p>\n<p>Officials also pointed to a broader concern: apps installed as APK files from outside the Play Store are at higher risk, since they bypass the security checks that Google applies to apps listed in its official marketplace.<\/p>\n<p>What Users Should Do Now<\/p>\n<p>For most users who update their apps regularly, <a href=\"https:\/\/www.techrepublic.com\/article\/news-engagelab-sdk-android-vulnerability-malware-bridge\/\" target=\"_blank\" rel=\"noopener nofollow\">the risk<\/a> has likely passed. But for anyone who has not updated since mid-2025, the recommended action goes beyond a simple app refresh.<\/p>\n<p>Security teams are advising those users to move their funds into entirely new wallets, generated with fresh seed phrases. Any wallet that was active and unpatched during the exposure window should be treated as potentially compromised.<\/p>\n<p>The disclosure comes alongside a separate Android chip vulnerability flagged the previous month and a new US Treasury initiative that pairs government agencies with crypto firms to share cybersecurity threat information \u2014 a sign that mobile security in the crypto space is drawing attention at the highest levels.<\/p>\n<p><em>Featured image from Bleeping Computer, chart from TradingView<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A patch has been available for nearly a year, but millions of Android users may still be running vulnerable crypto wallet apps \u2014 leaving their funds and private keys exposed to a known security flaw. Microsoft\u2019s Defender Security Research Team went public last week with details of a vulnerability it first caught in April 2025. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-80499","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/80499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=80499"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/80499\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=80499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=80499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=80499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}