• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Hackers can steal 2FA codes and personal messages from Android telephones

Admin by Admin
October 14, 2025
Home Technology
Share on FacebookShare on Twitter



Android units are weak to a brand new assault that may covertly steal 2FA codes, location timelines, and different non-public knowledge in lower than 30 seconds.

The brand new assault, named Pixnapping by the group of educational researchers who devised it, requires a sufferer to first set up a malicious app on an Android telephone or pill. The app, which requires no system permissions, can then successfully learn knowledge that every other put in app shows on the display. Pixnapping has been demonstrated on Google Pixel telephones and the Samsung Galaxy S25 telephone and certain may very well be modified to work on different fashions with extra work. Google launched mitigations final month, however the researchers mentioned a modified model of the assault works even when the replace is put in.

Like taking a screenshot

Pixnapping assaults start with the malicious app invoking Android programming interfaces that trigger the authenticator or different focused apps to ship delicate data to the system display. The malicious app then runs graphical operations on particular person pixels of curiosity to the attacker. Pixnapping then exploits a aspect channel that permits the malicious app to map the pixels at these coordinates to letters, numbers, or shapes.

“Something that’s seen when the goal app is opened may be stolen by the malicious app utilizing Pixnapping,” the researchers wrote on an informational web site. “Chat messages, 2FA codes, electronic mail messages, and so on. are all weak since they’re seen. If an app has secret data that’s not seen (e.g., it has a secret key that’s saved however by no means proven on the display), that data can’t be stolen by Pixnapping.”

The brand new assault class is harking back to GPU.zip, a 2023 assault that allowed malicious web sites to learn the usernames, passwords, and different delicate visible knowledge displayed by different web sites. It labored by exploiting aspect channels present in GPUs from all main suppliers. The vulnerabilities that GPU.zip exploited have by no means been fastened. As an alternative, the assault was blocked in browsers by limiting their skill to open iframes, an HTML ingredient that permits one web site (within the case of GPU.zip, a malicious one) to embed the contents of a website from a special area.

Tags: 2FAAndroidCodeshackersmessagesphonesPrivateSteal
Admin

Admin

Next Post
10 Metroidvanias With The Most Rewarding Exploration

10 Metroidvanias With The Most Rewarding Exploration

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Fortinet FortiWeb Material Connector Flaw Permits Distant Code Execution

Fortinet FortiWeb Material Connector Flaw Permits Distant Code Execution

July 13, 2025
After researchers unmasked a prolific SMS scammer, a brand new operation has emerged in its wake

After researchers unmasked a prolific SMS scammer, a brand new operation has emerged in its wake

August 10, 2025

Trending.

The right way to Defeat Imagawa Tomeji

The right way to Defeat Imagawa Tomeji

September 28, 2025
How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025
Satellite tv for pc Navigation Methods Going through Rising Jamming and Spoofing Assaults

Satellite tv for pc Navigation Methods Going through Rising Jamming and Spoofing Assaults

March 26, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
AI Girlfriend Chatbots With No Filter: 9 Unfiltered Digital Companions

AI Girlfriend Chatbots With No Filter: 9 Unfiltered Digital Companions

May 18, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

The philosophical puzzle of rational synthetic intelligence | MIT Information

The philosophical puzzle of rational synthetic intelligence | MIT Information

January 31, 2026
6 Finest Recruiting Automation Instruments I Evaluated for 2026

6 Finest Recruiting Automation Instruments I Evaluated for 2026

January 31, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved