Hackers can steal 2FA codes and personal messages from Android telephones

Editorial Team
3 Min Read



Android units are weak to a brand new assault that may covertly steal 2FA codes, location timelines, and different non-public knowledge in lower than 30 seconds.

The brand new assault, named Pixnapping by the staff of educational researchers who devised it, requires a sufferer to first set up a malicious app on an Android telephone or pill. The app, which requires no system permissions, can then successfully learn knowledge that some other put in app shows on the display. Pixnapping has been demonstrated on Google Pixel telephones and the Samsung Galaxy S25 telephone and sure could possibly be modified to work on different fashions with extra work. Google launched mitigations final month, however the researchers stated a modified model of the assault works even when the replace is put in.

Like taking a screenshot

Pixnapping assaults start with the malicious app invoking Android programming interfaces that trigger the authenticator or different focused apps to ship delicate data to the machine display. The malicious app then runs graphical operations on particular person pixels of curiosity to the attacker. Pixnapping then exploits a aspect channel that enables the malicious app to map the pixels at these coordinates to letters, numbers, or shapes.

“Something that’s seen when the goal app is opened might be stolen by the malicious app utilizing Pixnapping,” the researchers wrote on an informational web site. “Chat messages, 2FA codes, e mail messages, and many others. are all weak since they’re seen. If an app has secret data that isn’t seen (e.g., it has a secret key that’s saved however by no means proven on the display), that data can’t be stolen by Pixnapping.”

The brand new assault class is harking back to GPU.zip, a 2023 assault that allowed malicious web sites to learn the usernames, passwords, and different delicate visible knowledge displayed by different web sites. It labored by exploiting aspect channels present in GPUs from all main suppliers. The vulnerabilities that GPU.zip exploited have by no means been mounted. As a substitute, the assault was blocked in browsers by limiting their skill to open iframes, an HTML factor that enables one web site (within the case of GPU.zip, a malicious one) to embed the contents of a website from a unique area.

Share This Article