Microsoft finds vulnerability exposing millions of Android crypto wallet users

April 12, 20262 min read1 sources
Share:
Microsoft finds vulnerability exposing millions of Android crypto wallet users

Microsoft security researchers have disclosed a significant vulnerability in a third-party software development kit (SDK) that exposed millions of Android cryptocurrency wallet users to potential data theft and fraud. The flaws were discovered in the EngageLab Push SDK, a component used by over 10 major crypto wallet applications available on the Google Play Store.

The research, published by the Microsoft 365 Defender Research Team, details multiple security weaknesses in the SDK. The component collected and stored sensitive user and device data—including IMEI, MAC address, and location information—in an insecure location on the device's external storage. This made the data accessible to other applications with basic permissions.

Additionally, the researchers found a local SQL injection flaw. A malicious actor could have exploited it by sending a specially crafted push notification to inject commands and potentially extract or manipulate data stored by the SDK. The investigation also revealed that the SDK transmitted the collected data back to its servers over unencrypted HTTP. This practice left user data vulnerable to Man-in-the-Middle (MITM) attacks, where an attacker on the same network could intercept and read the information. Using a VPN can help protect against such threats by encrypting a device's internet traffic.

While the research found no direct evidence that the SDK collected crypto wallet private keys or seed phrases, the insecure handling of other sensitive data created a substantial attack surface that could be chained with other exploits to compromise user accounts and assets.

Microsoft reported the vulnerabilities to EngageLab in April 2023. The vendor acknowledged the issues and released a patched version of the SDK the following month. The public disclosure was withheld until February 2024 to allow app developers sufficient time to integrate the fix and for users to update their applications, mitigating the immediate risk.

Share:

// SOURCES

// RELATED

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17

ZionSiphon malware designed to sabotage water treatment systems

A new proof-of-concept malware, ZionSiphon, demonstrates how attackers can sabotage water treatment plants by manipulating industrial control systems.

2 min readApr 17

ThreatsDay bulletin: A deep dive into the Defender 0-day, SonicWall attacks, and a 17-year-old Excel flaw

This week’s threat bulletin is a heavy one. We analyze the critical Microsoft Defender 0-day, a massive SonicWall brute-force campaign, and a 17-year-

6 min readApr 17

Microsoft Defender's 'RedSun' zero-day: A researcher's protest and a threat to Windows systems

A researcher's protest exposed a critical zero-day in Microsoft Defender, allowing attackers full system control. Here's the technical breakdown and h

7 min readApr 17