Android SDK flaw exposed 50 million users to credential theft

Zaid Al-Mansouri
By
Zaid Al-Mansouri
Tech writer at All Things Geek. Covers smartphones, wearables, and mobile technology.
8 Min Read
Android SDK flaw exposed 50 million users to credential theft

An Android SDK vulnerability exposed over 50 million users to potential credential and financial data theft, raising serious questions about how third-party developer libraries are vetted before reaching production apps. The flaw, discovered in EngageLab’s Android SDK version 4.5.4, created a direct pathway for malicious apps to bypass Android’s security sandbox and access private user information without permission.

Key Takeaways

  • EngageSDK version 4.5.4 contained a critical intent redirection flaw in its MTCommonActivity component, affecting over 50 million app installs globally.
  • Crypto wallet apps bore the heaviest burden, with over 30 million vulnerable installs concentrated in this sector alone.
  • Microsoft Defender Security Research Team identified the flaw in April 2025 and coordinated disclosure with EngageLab and Google’s Android Security Team.
  • The patched version 5.2.1 became available on November 3, 2025, with no evidence of active exploitation found in the wild.
  • Google Play removed all detected vulnerable apps, and Android added user-level protections to mitigate further risk.

How the Android SDK vulnerability worked

The Android SDK vulnerability stemmed from a single architectural oversight: EngageLab’s MTCommonActivity component was exported without proper protection, meaning any app on a device could interact with it directly. This exported component could be hijacked by malicious apps to redirect user actions and intercept sensitive data flows. The flaw affected EngageSDK version 4.5.4, a library used for push notifications and in-app messaging across thousands of apps in Google Play.

The attack surface was particularly dangerous because it required no user interaction. A malicious app didn’t need to trick users into clicking anything—it could silently exploit the vulnerability to access credentials, session tokens, and financial information from legitimate apps running on the same device. The crypto wallet sector faced the worst exposure, with over 30 million vulnerable installs, but the total reach extended far beyond finance.

Why crypto wallets were hit hardest

Crypto wallet applications depend heavily on third-party SDKs for push notifications and user engagement features. Many wallet developers integrated EngageSDK without realizing they were introducing a critical security gap. The combination of sensitive financial data stored in wallet apps and the ease of exploiting the intent redirection flaw created a perfect storm for attackers.

What makes this particularly troubling is that wallet users expect military-grade security when storing cryptocurrency. A vulnerability in a third-party notification library—a component that seems peripheral to core wallet functionality—bypassed that security entirely. This highlights a structural problem in mobile app security: developers often trust third-party SDKs without auditing their code or understanding their attack surface.

Timeline and mitigation

Microsoft Defender Security Research Team discovered the Android SDK vulnerability in April 2025 and reported it through coordinated vulnerability disclosure channels to both EngageLab and Google’s Android Security Team. The vendor released a patch in EngageSDK version 5.2.1 on November 3, 2025, fixing the flaw by setting MTCommonActivity to non-exported status, effectively closing the attack vector.

Google responded by removing all detected vulnerable apps from Google Play and implementing user-level protections within Android itself. Critically, Microsoft found no evidence of active exploitation in the wild at the time of disclosure, suggesting the vulnerability may have gone unnoticed by threat actors despite its severity.

What developers and users should do now

For developers, the immediate action is clear: update to EngageSDK version 5.2.1 or later. Any app still using version 4.5.4 should be treated as compromised and updated urgently. App stores and security teams should audit their dependency trees to identify other potentially problematic third-party SDKs that export components without proper protection.

For users, the risk is now substantially lower thanks to Google’s removal of vulnerable apps and Android’s added protections. However, this incident underscores a broader truth: security is only as strong as the weakest link in your app’s supply chain. Users concerned about their exposure should enable two-factor authentication on financial accounts, monitor their crypto wallet activity closely, and consider using hardware wallets for large holdings.

The larger SDK security problem

The Android SDK vulnerability is not an isolated incident. Third-party SDKs are ubiquitous in mobile development, yet many developers treat them as black boxes. This creates an asymmetry: a single vulnerable library can compromise millions of apps simultaneously. The crypto sector, which faces constant scrutiny from regulators and threat actors alike, is especially vulnerable to supply-chain attacks through SDKs.

Google Play’s vetting process, while robust, cannot catch every vulnerability in the millions of libraries used across millions of apps. Developers need better tools for auditing SDK permissions and exported components. Users need better visibility into which third-party libraries their apps depend on. Until the industry develops stronger standards for SDK security, vulnerabilities like this one will continue to emerge.

Is my app affected by the Android SDK vulnerability?

If your app uses EngageSDK version 4.5.4 or earlier, it is affected. Check your dependency declarations and update to version 5.2.1 immediately. If you cannot identify which version you’re using, assume you’re vulnerable and update. Google has already removed vulnerable apps from Play, so if your app is still live, you’ve likely already patched or been delisted.

Can I recover stolen credentials from this vulnerability?

If your credentials were exposed through the Android SDK vulnerability, change your passwords immediately on any services you accessed through affected apps, particularly crypto exchanges and wallets. Enable two-factor authentication everywhere possible. If you stored sensitive data in a wallet app that used EngageSDK 4.5.4, consider moving funds to a hardware wallet or a different service. Monitor your accounts for unauthorized activity.

Why wasn’t this Android SDK vulnerability caught earlier?

The vulnerability existed because the component was exported by default without explicit security review. Most developers don’t audit every line of code in third-party SDKs—they trust that the vendor has done so. This vulnerability slipped through because it required understanding Android’s intent system and the security implications of exporting components. It’s a technical flaw that wasn’t obvious to the casual developer, but it should have been caught by EngageLab’s security team.

The Android SDK vulnerability serves as a stark reminder that security in mobile development depends on multiple layers of scrutiny. Individual developers can’t be expected to audit every SDK, but vendors must take responsibility for their code. Google’s removal of vulnerable apps and addition of user-level protections helped contain the damage, but the real lesson is this: third-party dependencies deserve the same security rigor as first-party code. Until that standard becomes universal, millions of users will remain at risk.

Edited by the All Things Geek team.

Source: TechRadar

Share This Article
Tech writer at All Things Geek. Covers smartphones, wearables, and mobile technology.