Company Details
nothingtech
28,896
242,125
513
nothing.tech
0
NOT_9686623
In-progress


Nothing Vendor Cyber Rating & Cyber Score
nothing.techNothing exists to make tech feel exciting again. We’re building a different kind of company, one that puts design, emotion, and human creativity at the heart of everything we do. From the way our products look to how they sound, feel, and function, we care about the details that make technology not just useful, but inspiring. This is a place for the curious. The creators. The ones who ask why not and mean it. If you're drawn to bold ideas, fast moves, and work that actually makes you feel something, you’ll fit right in. We're not here to follow the rules. We're here to make better ones. Founded in London in 2020, Nothing is a design-led tech company building an alternative to the industry giants. Our products, from award-winning smartphones to expressive audio and wearables, blend iconic design with intuitive engineering to put people and creativity back at the centre of consumer tech. Backed by GV (Google Ventures), EQT Ventures, C Ventures, and influential investors like Tony Fadell (iPod), Casey Neistat, and Kevin Lin (Twitch), we’ve grown from startup to global challenger in just a few years.
Company Details
nothingtech
28,896
242,125
513
nothing.tech
0
NOT_9686623
In-progress
Between 750 and 799

Nothing Global Score (TPRM)XXXX

Description: Critical Android Vulnerability Exposes Encryption Keys and Crypto Wallet Data Security researchers at Ledger’s Donjon team have uncovered a severe vulnerability in certain Android smartphones, potentially affecting up to 25% of devices worldwide. The flaw, tied to specific MediaTek chipsets using Trustonic’s Trusted Execution Environment (TEE), allows attackers with brief physical access to extract sensitive data including encryption keys and cryptocurrency wallet seed phrases in under a minute. The issue stems from a weakness in the device’s boot chain, a security mechanism that validates system components during startup. Normally, this process protects encryption keys until the OS fully loads. However, researchers demonstrated that by connecting a vulnerable phone to a computer via USB, attackers could bypass security protections before the OS completes booting. In a proof-of-concept test using a Nothing CMF Phone 1, the Donjon team recovered the device’s PIN, decrypted storage, and extracted seed phrases from six crypto wallets Trust Wallet, Base, Kraken Wallet, Rabby, Tangem, and Phantom within 45 seconds. The vulnerability, tracked as CVE-2026-20435 in MediaTek’s security bulletin, affects devices relying on certain MediaTek processors, which are prevalent in budget and midrange Android phones. MediaTek has issued a firmware fix to manufacturers, but users must install pending updates to mitigate the risk. Until then, affected devices remain exposed to offline decryption attacks once root cryptographic keys are extracted. Ledger’s CTO, Charles Guillemet, noted that smartphones were not designed as secure storage for digital assets, emphasizing that their security depends on the integrity of hardware, firmware, and software. The discovery underscores the risks of storing sensitive data on mobile devices without additional safeguards.


Nothing has 39.02% fewer incidents than the average of same-industry companies with at least one recorded incident.
Nothing has 13.79% fewer incidents than the average of all companies with at least one recorded incident.
Nothing reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Nothing cyber incidents detection timeline including parent company and subsidiaries

Nothing exists to make tech feel exciting again. We’re building a different kind of company, one that puts design, emotion, and human creativity at the heart of everything we do. From the way our products look to how they sound, feel, and function, we care about the details that make technology not just useful, but inspiring. This is a place for the curious. The creators. The ones who ask why not and mean it. If you're drawn to bold ideas, fast moves, and work that actually makes you feel something, you’ll fit right in. We're not here to follow the rules. We're here to make better ones. Founded in London in 2020, Nothing is a design-led tech company building an alternative to the industry giants. Our products, from award-winning smartphones to expressive audio and wearables, blend iconic design with intuitive engineering to put people and creativity back at the centre of consumer tech. Backed by GV (Google Ventures), EQT Ventures, C Ventures, and influential investors like Tony Fadell (iPod), Casey Neistat, and Kevin Lin (Twitch), we’ve grown from startup to global challenger in just a few years.


Avnet is a global electronic components distributor with extensive design, product, marketing and supply chain expertise for customers and suppliers at every stage of the product lifecycle. For the past 100 years, Avnet has helped its customers and suppliers around the world realize the transformati
Jumia (NYSE :JMIA) is a leading e-commerce platform in Africa. It is built around a marketplace, Jumia Logistics, and JumiaPay. The marketplace helps millions of consumers and sellers to connect and transact. Jumia Logistics enables the delivery of millions of packages through our network of local p

At eBay, we create pathways to connect millions of sellers and buyers in more than 190 markets around the world. Our technology empowers our customers, providing everyone the opportunity to grow and thrive — no matter who they are or where they are in the world. And the ripple effect of our work cre
YouTube is a team-oriented, creative workplace where every single employee has a voice in the choices we make and the features we implement. We work together in small teams to design, develop, and roll out key features and products in very short time frames. Which means something you write today cou

Türk internet kullanıcılarının en çok tercih ettiği dijital platform olan Mynet, 1999 yılından bugüne liderliğini koruyor. Kendi alanında sayısız ilki gerçekleştiren öncü internet devi Mynet, Türkiye'nin dijital ekosisteminin kalkınmasına ve gelişmesine destek olmayı sürdürüyor. Her ay ortalama 4

Fanatics is a leading global digital sports platform. We ignite the passions of global sports fans and maximize the presence and reach for our hundreds of sports partners globally by offering products and services across Fanatics Commerce, Fanatics Collectibles, and Fanatics Betting & Gaming, allowi
OYO is a global platform that aims to empower entrepreneurs and small businesses with hotels and homes by providing full-stack technology products and services that aims to increase revenue and ease operations; bringing easy-to-book, affordable, and trusted accommodation to customers around the worl

At Peraton, we're at the forefront of delivering the next big thing every day. We're the partner of choice to help solve some of the world's most daunting challenges, delivering bold, new solutions to keep people around the world safer and more secure. How do we do it? By thinking differently. We'r
IndiaMART is India's largest online B2B marketplace, connecting buyers with suppliers across a wide array of industries. IndiaMART provides a platform for Small & Medium Enterprises (SMEs), large enterprises, and individual buyers, helping them access diverse portfolios of quality products. Since 1
.png)
X-Forces Enterprise is delighted to extend the training services it offers, within the military community, to a new Masterclass programme...
The social media lawsuit Murthy v. Missouri, originally filed as Missouri v. Biden, has finally come to an end.
Pepe exploded from nothing to $11 billion. The people who acted early made the biggest returns of their lives. The correction is creating...
Answering a silent scam call can mark your number as a high-value target. Here's how to deal with them.
Armor announced Armor Dash, an executive dashboard that gives boards and the C-suite a continuous, unfiltered view of cybersecurity.
The findings from the cybersecurity nonprofit revealed that 44% of those surveyed were victims of cybercrime in 2025.
Global disruption continues as staff face wiped systems, halted production and slow recovery following major cybersecurity breach.
Some drivers in Massachusetts are unable to start their cars due to a cybersecurity issue affecting a company that provides in-vehicle...
With Harry Stebbings, Jason Lemkin, and Rory O'Driscoll. Anthropic wiped $20 billion off cybersecurity stocks with a single product release.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Nothing is http://nothing.tech.
According to Rankiteo, Nothing’s AI-generated cybersecurity score is 784, reflecting their Fair security posture.
According to Rankiteo, Nothing currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Nothing has been affected by a supply chain cyber incident involving MediaTek, with the incident ID TANKRANOTMEDCOI1773311566.
According to Rankiteo, Nothing is not certified under SOC 2 Type 1.
According to Rankiteo, Nothing does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Nothing is not listed as GDPR compliant.
According to Rankiteo, Nothing does not currently maintain PCI DSS compliance.
According to Rankiteo, Nothing is not compliant with HIPAA regulations.
According to Rankiteo,Nothing is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Nothing operates primarily in the Technology, Information and Internet industry.
Nothing employs approximately 28,896 people worldwide.
Nothing presently has no subsidiaries across any sectors.
Nothing’s official LinkedIn profile has approximately 242,125 followers.
Nothing is classified under the NAICS code 513, which corresponds to Others.
Yes, Nothing has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/nothing-4537.
Yes, Nothing maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/nothingtech.
As of April 03, 2026, Rankiteo reports that Nothing has experienced 1 cybersecurity incidents.
Nothing has an estimated 14,204 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with ledger’s donjon team (security researchers), and containment measures with mediatek issued a firmware fix to manufacturers, and remediation measures with users must install pending updates to mitigate the risk..
Title: Critical Android Vulnerability Exposes Encryption Keys and Crypto Wallet Data
Description: Security researchers at Ledger’s Donjon team uncovered a severe vulnerability in certain Android smartphones with specific MediaTek chipsets using Trustonic’s Trusted Execution Environment (TEE). The flaw allows attackers with brief physical access to extract sensitive data, including encryption keys and cryptocurrency wallet seed phrases, in under a minute by bypassing security protections during the boot process.
Type: Vulnerability Exploitation
Attack Vector: Physical Access
Vulnerability Exploited: CVE-2026-20435 (MediaTek chipset boot chain weakness)
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Data Compromised: Encryption keys, cryptocurrency wallet seed phrases
Systems Affected: Android smartphones with specific MediaTek chipsets
Brand Reputation Impact: Potential reputational damage to affected manufacturers and crypto wallet providers
Identity Theft Risk: High (due to exposure of encryption keys and seed phrases)
Payment Information Risk: High (cryptocurrency wallet data)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Encryption keys and cryptocurrency wallet seed phrases.

Entity Name: MediaTek
Entity Type: Semiconductor Manufacturer
Industry: Technology/Hardware
Customers Affected: Up to 25% of Android devices worldwide

Entity Name: Trustonic
Entity Type: Security Software Provider
Industry: Cybersecurity

Entity Name: Nothing CMF Phone 1
Entity Type: Smartphone Manufacturer
Industry: Consumer Electronics

Entity Name: Trust Wallet
Entity Type: Cryptocurrency Wallet Provider
Industry: FinTech

Entity Name: Base
Entity Type: Cryptocurrency Wallet Provider
Industry: FinTech

Entity Name: Kraken Wallet
Entity Type: Cryptocurrency Wallet Provider
Industry: FinTech

Entity Name: Rabby
Entity Type: Cryptocurrency Wallet Provider
Industry: FinTech

Entity Name: Tangem
Entity Type: Cryptocurrency Wallet Provider
Industry: FinTech

Entity Name: Phantom
Entity Type: Cryptocurrency Wallet Provider
Industry: FinTech

Third Party Assistance: Ledger’s Donjon team (security researchers)
Containment Measures: MediaTek issued a firmware fix to manufacturers
Remediation Measures: Users must install pending updates to mitigate the risk
Third-Party Assistance: The company involves third-party assistance in incident response through Ledger’s Donjon team (security researchers).

Type of Data Compromised: Encryption keys, cryptocurrency wallet seed phrases
Sensitivity of Data: High (cryptographic keys, financial data)
Data Exfiltration: Possible (attackers can extract data)
Data Encryption: Weakened (due to vulnerability in boot chain)
Personally Identifiable Information: Cryptocurrency wallet seed phrases (indirect PII risk)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Users must install pending updates to mitigate the risk.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by mediatek issued a firmware fix to manufacturers.

Lessons Learned: Smartphones may not be secure enough for storing sensitive digital assets like cryptocurrency wallet seed phrases. Security depends on the integrity of hardware, firmware, and software.

Recommendations: Users should install firmware updates promptly, avoid storing sensitive data on mobile devices without additional safeguards, and consider using dedicated hardware wallets for cryptocurrency storage.
Key Lessons Learned: The key lessons learned from past incidents are Smartphones may not be secure enough for storing sensitive digital assets like cryptocurrency wallet seed phrases. Security depends on the integrity of hardware, firmware, and software.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Users should install firmware updates promptly, avoid storing sensitive data on mobile devices without additional safeguards and and consider using dedicated hardware wallets for cryptocurrency storage..

Source: Ledger’s Donjon team

Source: MediaTek Security Bulletin
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Ledger’s Donjon team, and Source: MediaTek Security Bulletin.

Investigation Status: Vulnerability disclosed, patch available

Customer Advisories: Users of affected Android devices should install pending updates to mitigate the risk.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Users of affected Android devices should install pending updates to mitigate the risk..

Root Causes: Weakness in the device’s boot chain security mechanism, allowing bypass of security protections before the OS fully loads.
Corrective Actions: MediaTek issued a firmware fix; users must install updates.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Ledger’s Donjon team (security researchers).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: MediaTek issued a firmware fix; users must install updates..
Most Significant Data Compromised: The most significant data compromised in an incident were Encryption keys and cryptocurrency wallet seed phrases.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Ledger’s Donjon team (security researchers).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was MediaTek issued a firmware fix to manufacturers.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Encryption keys and cryptocurrency wallet seed phrases.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Smartphones may not be secure enough for storing sensitive digital assets like cryptocurrency wallet seed phrases. Security depends on the integrity of hardware, firmware, and software.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Users should install firmware updates promptly, avoid storing sensitive data on mobile devices without additional safeguards and and consider using dedicated hardware wallets for cryptocurrency storage..
Most Recent Source: The most recent source of information about an incident are Ledger’s Donjon team and MediaTek Security Bulletin.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Vulnerability disclosed, patch available.
Most Recent Customer Advisory: The most recent customer advisory issued was an Users of affected Android devices should install pending updates to mitigate the risk.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.