How We Cracked a Smartphone Giant's Encryption for $5
valkant/April 2026
OPPO is one of the largest smartphone manufacturers in the world. Hundreds of millions of people rely on OPPO Cloud to back up their contacts, photos, SMS messages, and GPS location data. Their Find My Phone feature uses the same infrastructure. All of that data is protected in transit by encryption. The problem was the encryption itself.
While reviewing OPPO Cloud's client-side code, we found that the transport encryption protecting all of these sensitive services was using an RSA key size that has been publicly broken since 1999. The key was so small that we were able to factor it using commodity cloud compute for roughly $5 AUD. That gave us the private key. With the private key, we could forge valid encrypted requests to every production endpoint that relied on it.
Let that sink in. Find My Phone, real-time GPS tracking, contact syncing, SMS backup, photo storage. All of it was protected by a cryptographic key that costs less than a cup of coffee to break. Every single production endpoint accepted forged requests built with the recovered key material.
We reported this through OPPO's security response program. It was rated CVSS 9.1 Critical, which is about as high as it gets. The scope of impact was massive because the weak key was not isolated to a single feature. It was the foundation of the entire transport encryption layer for OPPO Cloud services.
This is the kind of bug that scanners will never find. No automated tool is going to pull a key out of a JavaScript bundle, measure its bit length, and flag it as factored. It took manual review, understanding of how RSA works, and the curiosity to actually try breaking the key instead of assuming a major company would use adequate key sizes.
The lesson here is simple. Never assume that big companies get the fundamentals right. Cryptographic primitives are easy to set and forget. Teams build encryption layers, ship them, and move on to the next feature. Nobody revisits the key size five years later. Nobody audits the actual strength of the keys protecting user data.
Five dollars. That was the cost to compromise the encryption protecting cloud services for one of the largest smartphone brands on the planet. If you are doing security research, check the crypto. Always check the crypto.