A patch has been accessible for almost a yr, however hundreds of thousands of Android customers should be working susceptible crypto pockets apps — leaving their funds and personal keys uncovered to a recognized safety flaw.
Microsoft’s Defender Safety Analysis Group went public final week with particulars of a vulnerability it first caught in April 2025. The flaw lived inside a extensively used software program part referred to as the EngageLab SDK, model 4.5.4.
As a result of that SDK is baked into hundreds of Android apps, a single malicious app may set off a sequence response that reached far past itself.
How The Assault Works
The tactic is named “intent redirection.” An attacker’s app sends a specifically crafted message to any app working the flawed SDK model. As soon as that message lands, the focused app is tricked into handing over learn and write entry to its personal knowledge — together with saved seed phrases and pockets addresses.

Supply: Microsoft
Android’s built-in sandbox system, which usually retains apps from seeing one another’s knowledge, was bypassed solely. In accordance with Microsoft, the assault affected greater than 50 million apps throughout the Android ecosystem, with roughly 30 million of these being crypto wallets.
The vulnerability didn’t require the consumer to do something fallacious. No suspicious hyperlinks. No phishing pages. Simply having the fallacious apps put in on the identical time was sufficient.

Supply: Microsoft
Response From Microsoft And Google
Microsoft moved rapidly after its discovery. By Might 2025, the corporate had introduced Google and the Android Safety Group into the response. EngageLab launched a hard and fast model — SDK 5.2.1 — shortly after.
Reviews point out that each Microsoft and Google have since directed customers on methods to confirm whether or not their pockets apps have been up to date via Google Play Defend.
BTCUSD buying and selling at $72,906 on the 24-hour chart: TradingView
Officers additionally pointed to a broader concern: apps put in as APK information from exterior the Play Retailer are at greater danger, since they bypass the safety checks that Google applies to apps listed in its official market.
What Customers Ought to Do Now
For many customers who replace their apps frequently, the chance has possible handed. However for anybody who has not up to date since mid-2025, the beneficial motion goes past a easy app refresh.
Safety groups are advising these customers to maneuver their funds into solely new wallets, generated with contemporary seed phrases. Any pockets that was energetic and unpatched through the publicity window needs to be handled as doubtlessly compromised.
The disclosure comes alongside a separate Android chip vulnerability flagged the earlier month and a brand new US Treasury initiative that pairs authorities businesses with crypto corporations to share cybersecurity risk data — an indication that cell safety within the crypto area is drawing consideration on the highest ranges.
Featured picture from Bleeping Laptop, chart from TradingView
Editorial Course of for bitcoinist is centered on delivering totally researched, correct, and unbiased content material. We uphold strict sourcing requirements, and every web page undergoes diligent overview by our group of high know-how specialists and seasoned editors. This course of ensures the integrity, relevance, and worth of our content material for our readers.
