• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Hackers can steal 2FA codes and personal messages from Android telephones

Admin by Admin
October 14, 2025
Home Technology
Share on FacebookShare on Twitter



Android units are weak to a brand new assault that may covertly steal 2FA codes, location timelines, and different non-public knowledge in lower than 30 seconds.

The brand new assault, named Pixnapping by the group of educational researchers who devised it, requires a sufferer to first set up a malicious app on an Android telephone or pill. The app, which requires no system permissions, can then successfully learn knowledge that every other put in app shows on the display. Pixnapping has been demonstrated on Google Pixel telephones and the Samsung Galaxy S25 telephone and certain may very well be modified to work on different fashions with extra work. Google launched mitigations final month, however the researchers mentioned a modified model of the assault works even when the replace is put in.

Like taking a screenshot

Pixnapping assaults start with the malicious app invoking Android programming interfaces that trigger the authenticator or different focused apps to ship delicate data to the system display. The malicious app then runs graphical operations on particular person pixels of curiosity to the attacker. Pixnapping then exploits a aspect channel that permits the malicious app to map the pixels at these coordinates to letters, numbers, or shapes.

“Something that’s seen when the goal app is opened may be stolen by the malicious app utilizing Pixnapping,” the researchers wrote on an informational web site. “Chat messages, 2FA codes, electronic mail messages, and so on. are all weak since they’re seen. If an app has secret data that’s not seen (e.g., it has a secret key that’s saved however by no means proven on the display), that data can’t be stolen by Pixnapping.”

The brand new assault class is harking back to GPU.zip, a 2023 assault that allowed malicious web sites to learn the usernames, passwords, and different delicate visible knowledge displayed by different web sites. It labored by exploiting aspect channels present in GPUs from all main suppliers. The vulnerabilities that GPU.zip exploited have by no means been fastened. As an alternative, the assault was blocked in browsers by limiting their skill to open iframes, an HTML ingredient that permits one web site (within the case of GPU.zip, a malicious one) to embed the contents of a website from a special area.

Tags: 2FAAndroidCodeshackersmessagesphonesPrivateSteal
Admin

Admin

Next Post
10 Metroidvanias With The Most Rewarding Exploration

10 Metroidvanias With The Most Rewarding Exploration

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Open Supply CISA Instrument Helps Defenders With Hacker Containment, Eviction

Open Supply CISA Instrument Helps Defenders With Hacker Containment, Eviction

August 1, 2025
8BitDo’s Clear Inexperienced Wi-fi Gaming Mouse Will get First Low cost

8BitDo’s Clear Inexperienced Wi-fi Gaming Mouse Will get First Low cost

April 26, 2025

Trending.

The right way to Defeat Imagawa Tomeji

The right way to Defeat Imagawa Tomeji

September 28, 2025
How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025
Satellite tv for pc Navigation Methods Going through Rising Jamming and Spoofing Assaults

Satellite tv for pc Navigation Methods Going through Rising Jamming and Spoofing Assaults

March 26, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

August 28, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Home windows Malware Makes use of Pulsar RAT for Stay Chats Whereas Stealing Knowledge – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra

Home windows Malware Makes use of Pulsar RAT for Stay Chats Whereas Stealing Knowledge – Hackread – Cybersecurity Information, Knowledge Breaches, AI, and Extra

February 1, 2026
AI brokers now have their very own Reddit-style social community, and it is getting bizarre quick

AI brokers now have their very own Reddit-style social community, and it is getting bizarre quick

February 1, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved