Android Wallets Vulnerable to MediaTek Exploit, Solana Dapp Bonk.fun Hacked
A critical MediaTek exploit has rendered a quarter of Android crypto wallets vulnerable to seed phrase theft, while the Solana dApp Bonk.fun suffered a domain hijack and phishing attack.
The digital asset landscape is again highlighting persistent security weaknesses, with a critical exploit affecting a significant portion of Android crypto wallets and a direct attack on a Solana ecosystem meme coin platform. While Bitcoin (BTC) maintains a position near $70,000, these incidents underscore that the underlying technological and user-facing vulnerabilities remain a primary concern.

MediaTek Flaw Exposes Android Wallets
Ledger's white-hat security team, Donjon, has identified and reported a severe vulnerability in MediaTek chipsets that could allow attackers to steal crypto seed phrases from affected Android devices. This flaw resides within MediaTek's secure boot chain, a mechanism designed to ensure a phone starts only with authorized software. The exploit allows an attacker with physical access to an Android phone to bypass these security protections via a USB cable and specialized software. Donjon demonstrated this by compromising a Nothing CMF Phone 1 in approximately 45 seconds, recovering the phone's PIN, decrypting its storage, and extracting seed phrases from popular software wallets like Trust Wallet, Base, Kraken Wallet, Rabby, Tangem's Mobile Wallet, and Phantom.
Approximately 25% of Android phones utilize both the Trustonic Trusted Execution Environment (TEE) and MediaTek processors, putting a substantial number of mobile crypto users at risk. While MediaTek issued a patch in January, users who have not updated their devices remain vulnerable. This incident serves as a stark reminder that mobile devices, despite their convenience, present a significant attack surface for digital asset holders.

Bonk.fun Domain Hijacked
In a separate but related development, the Solana-based token issuance platform Bonk.fun experienced a domain hijack and subsequent phishing attempt. Hackers gained control of a team account, redirecting the bonk.fun domain to a wallet-draining phishing site. The platform operator, known as Tom, confirmed the incident via X, urging users to avoid the compromised domain. The attack specifically targeted users who signed a fake terms-of-service message on the malicious site after the breach. Fortunately, the incident was detected swiftly, and early reports suggest that losses have been contained. This event highlights the ongoing susceptibility of even well-established decentralized applications (dApps) to traditional web security exploits like domain hijacking and phishing, particularly within the often-speculative meme coin sector where user vigilance may be lower.
The rapid exploitation of a critical Android chip vulnerability and the successful domain hijack of a Solana dApp illustrate the persistent and evolving threat landscape facing digital asset users, irrespective of market sentiment.
These incidents underscore the need for continuous vigilance and proactive security measures. For Android users, immediately installing all available security patches is critical. For users interacting with dApps, especially those in nascent or meme-driven ecosystems, extreme caution is warranted regarding domain authenticity and any wallet signature requests. The market's resilience around BTC's $70,000 price point offers little comfort against these fundamental security challenges.