Close Menu
Technophile NewsTechnophile News
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
What's On
Two cybersecurity employees plead guilty to carrying out ransomware attacks

Two cybersecurity employees plead guilty to carrying out ransomware attacks

30 December 2025
The FCC has probably killed a plan to improve smart home security

The FCC has probably killed a plan to improve smart home security

30 December 2025
Anker’s portable backup battery is nearly half off

Anker’s portable backup battery is nearly half off

30 December 2025
GameSir put a tiny steering wheel on its new Swift Drive controller

GameSir put a tiny steering wheel on its new Swift Drive controller

30 December 2025
The Great Big Power Play

The Great Big Power Play

30 December 2025
Facebook X (Twitter) Instagram
  • Privacy
  • Terms
  • Advertise
  • Contact Us
Tuesday, December 30
Facebook X (Twitter) Instagram YouTube
Technophile NewsTechnophile News
Demo
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
Technophile NewsTechnophile News
Home » A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
News

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

By News Room14 October 20252 Mins Read
Facebook Twitter Pinterest LinkedIn Telegram Tumblr Reddit WhatsApp Email
A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
Share
Facebook Twitter LinkedIn Pinterest Email

Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data in less than 30 seconds.

The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

Like Taking a Screenshot

Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

“Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” the researchers wrote on an informational website. “Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible. If an app has secret information that is not visible (e.g., it has a secret key that is stored but never shown on the screen), that information cannot be stolen by Pixnapping.”

The new attack class is reminiscent of GPU.zip, a 2023 attack that allowed malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites. It worked by exploiting side channels found in GPUs from all major suppliers. The vulnerabilities that GPU.zip exploited have never been fixed. Instead, the attack was blocked in browsers by limiting their ability to open iframes, an HTML element that allows one website (in the case of GPU.zip, a malicious one) to embed the contents of a site from a different domain.

Pixnapping targets the same side channel as GPU.zip, specifically the precise amount of time it takes for a given frame to be rendered on the screen.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related News

Two cybersecurity employees plead guilty to carrying out ransomware attacks

Two cybersecurity employees plead guilty to carrying out ransomware attacks

30 December 2025
The FCC has probably killed a plan to improve smart home security

The FCC has probably killed a plan to improve smart home security

30 December 2025
Anker’s portable backup battery is nearly half off

Anker’s portable backup battery is nearly half off

30 December 2025
GameSir put a tiny steering wheel on its new Swift Drive controller

GameSir put a tiny steering wheel on its new Swift Drive controller

30 December 2025
The Great Big Power Play

The Great Big Power Play

30 December 2025
Gardyn Studio 2 review: this smart garden turned my black thumb green

Gardyn Studio 2 review: this smart garden turned my black thumb green

30 December 2025
Top Articles
The Nex Playground and Pixel Buds 2A top our list of the best deals this week

The Nex Playground and Pixel Buds 2A top our list of the best deals this week

13 December 202548 Views
OpenAI Launches GPT-5.2 as It Navigates ‘Code Red’

OpenAI Launches GPT-5.2 as It Navigates ‘Code Red’

11 December 202544 Views
The WIRED Guide to San Francisco for Business Travelers

The WIRED Guide to San Francisco for Business Travelers

5 November 202536 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Gardyn Studio 2 review: this smart garden turned my black thumb green

Gardyn Studio 2 review: this smart garden turned my black thumb green

30 December 2025

I can’t grow anything. Multiple attempts to create a cottage garden, first in Idaho and…

The Best Digital Notebooks and Smart Pens

The Best Digital Notebooks and Smart Pens

30 December 2025
The Canon EOS R6 Mark III is great, but this lens is amazing

The Canon EOS R6 Mark III is great, but this lens is amazing

30 December 2025
What Is a Preamp, and Do I Really Need One?

What Is a Preamp, and Do I Really Need One?

30 December 2025
Technophile News
Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Technophile News. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.