• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Hackers can steal 2FA codes and personal messages from Android telephones

Admin by Admin
October 14, 2025
Home Technology
Share on FacebookShare on Twitter



Android units are weak to a brand new assault that may covertly steal 2FA codes, location timelines, and different non-public knowledge in lower than 30 seconds.

The brand new assault, named Pixnapping by the group of educational researchers who devised it, requires a sufferer to first set up a malicious app on an Android telephone or pill. The app, which requires no system permissions, can then successfully learn knowledge that every other put in app shows on the display. Pixnapping has been demonstrated on Google Pixel telephones and the Samsung Galaxy S25 telephone and certain may very well be modified to work on different fashions with extra work. Google launched mitigations final month, however the researchers mentioned a modified model of the assault works even when the replace is put in.

Like taking a screenshot

Pixnapping assaults start with the malicious app invoking Android programming interfaces that trigger the authenticator or different focused apps to ship delicate data to the system display. The malicious app then runs graphical operations on particular person pixels of curiosity to the attacker. Pixnapping then exploits a aspect channel that permits the malicious app to map the pixels at these coordinates to letters, numbers, or shapes.

“Something that’s seen when the goal app is opened may be stolen by the malicious app utilizing Pixnapping,” the researchers wrote on an informational web site. “Chat messages, 2FA codes, electronic mail messages, and so on. are all weak since they’re seen. If an app has secret data that’s not seen (e.g., it has a secret key that’s saved however by no means proven on the display), that data can’t be stolen by Pixnapping.”

The brand new assault class is harking back to GPU.zip, a 2023 assault that allowed malicious web sites to learn the usernames, passwords, and different delicate visible knowledge displayed by different web sites. It labored by exploiting aspect channels present in GPUs from all main suppliers. The vulnerabilities that GPU.zip exploited have by no means been fastened. As an alternative, the assault was blocked in browsers by limiting their skill to open iframes, an HTML ingredient that permits one web site (within the case of GPU.zip, a malicious one) to embed the contents of a website from a special area.

Tags: 2FAAndroidCodeshackersmessagesphonesPrivateSteal
Admin

Admin

Next Post
10 Metroidvanias With The Most Rewarding Exploration

10 Metroidvanias With The Most Rewarding Exploration

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

The Obtain: The CDC’s vaccine chaos

A pivotal assembly on vaccine steerage is underway—and former CDC leaders are alarmed

September 21, 2025
Ecommerce Copywriting Suggestions for Higher Gross sales • Yoast

Ecommerce Copywriting Suggestions for Higher Gross sales • Yoast

September 11, 2025

Trending.

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

February 23, 2026
10 tricks to begin getting ready! • Yoast

10 tricks to begin getting ready! • Yoast

July 21, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

September 8, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Customers, Progress, and International Tendencies

Customers, Progress, and International Tendencies

March 18, 2026
How AI Is Altering Digital Asset Administration

How AI Is Altering Digital Asset Administration

March 18, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved