Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    A minority of businesses have won big with AI. What are they doing right?

    October 15, 2025

    New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions

    October 15, 2025

    CISOs must rethink the tabletop, as 57% of incidents have never been rehearsed

    October 15, 2025
    Facebook X (Twitter) Instagram
    Trending
    • A minority of businesses have won big with AI. What are they doing right?
    • New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions
    • CISOs must rethink the tabletop, as 57% of incidents have never been rehearsed
    • A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
    • Leaving Windows 10 today? How to clear your new Windows 11 PC cache (and start fresh)
    • Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing
    • Scattered Lapsus$ Hunters extortion site goes dark: What’s next?
    • Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
    Security

    A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    TechurzBy TechurzOctober 14, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data in less than 30 seconds.

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

    Like Taking a Screenshot

    Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

    “Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” the researchers wrote on an informational website. “Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible. If an app has secret information that is not visible (e.g., it has a secret key that is stored but never shown on the screen), that information cannot be stolen by Pixnapping.”

    The new attack class is reminiscent of GPU.zip, a 2023 attack that allowed malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites. It worked by exploiting side channels found in GPUs from all major suppliers. The vulnerabilities that GPU.zip exploited have never been fixed. Instead, the attack was blocked in browsers by limiting their ability to open iframes, an HTML element that allows one website (in the case of GPU.zip, a malicious one) to embed the contents of a site from a different domain.

    Pixnapping targets the same side channel as GPU.zip, specifically the precise amount of time it takes for a given frame to be rendered on the screen.

    2Factor Android Attack authentication codes Hackers lets phones steal
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleLeaving Windows 10 today? How to clear your new Windows 11 PC cache (and start fresh)
    Next Article CISOs must rethink the tabletop, as 57% of incidents have never been rehearsed
    Techurz
    • Website

    Related Posts

    Security

    A minority of businesses have won big with AI. What are they doing right?

    October 15, 2025
    Security

    New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions

    October 15, 2025
    Security

    CISOs must rethink the tabletop, as 57% of incidents have never been rehearsed

    October 15, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    A minority of businesses have won big with AI. What are they doing right?

    October 15, 2025

    New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions

    October 15, 2025

    CISOs must rethink the tabletop, as 57% of incidents have never been rehearsed

    October 15, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.