Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    We Built Our Perfect BMW iX3 and Kept It Under $72,000

    May 7, 2026

    Study: Firms often use automation to control certain workers’ wages | MIT News

    May 7, 2026

    Toronto World Cup tickets to be resold for face value on FIFA marketplace | World Cup 2026 News

    May 7, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Hackers can steal 2FA codes and private messages from Android phones
    Hackers can steal 2FA codes and private messages from Android phones
    Tech Reviews

    Hackers can steal 2FA codes and private messages from Android phones

    gvfx00@gmail.comBy gvfx00@gmail.comOctober 14, 2025No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Android devices are vulnerable to a new attack that can covertly steal 2FA codes, location timelines, and other private data in less than 30 seconds.

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

    Table of Contents

    Toggle
    • Like taking a screenshot
      • Related posts:
    • Save up to 50 percent on Bluetooth speakers, smart speakers and soundbars
    • Blue Origin landed its recycled New Glenn booster but failed to put payload in orbit
    • NASA's initial takeaways from the Artemis II mission, and more science stories

    Like taking a screenshot

    Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

    “Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” the researchers wrote on an informational website. “Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible. If an app has secret information that is not visible (e.g., it has a secret key that is stored but never shown on the screen), that information cannot be stolen by Pixnapping.”

    The new attack class is reminiscent of GPU.zip, a 2023 attack that allowed malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites. It worked by exploiting side channels found in GPUs from all major suppliers. The vulnerabilities that GPU.zip exploited have never been fixed. Instead, the attack was blocked in browsers by limiting their ability to open iframes, an HTML element that allows one website (in the case of GPU.zip, a malicious one) to embed the contents of a site from a different domain.

    Related posts:

    The Best 85+ Early Black Friday Deals You Can Shop on AirPods, TVs and Laptops Right Now

    Sony teases its next-gen 'True RGB' Mini LED TV technology

    Lenny Kravitz’s pirate king Bawma fronts the villains of IO Interactive’s bold James Bond reimaginin...

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAIAllure Free vs Paid Plan Comparison
    Next Article What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Ars Asks: Share your shell and show us your tricked-out terminals!

    May 7, 2026
    Tech Reviews

    A Star Fox Remake Is Heading To Switch 2 On June 25

    May 6, 2026
    Tech Reviews

    World Cup 2026: Peacock Adds New Streaming Features for Spanish-Language Coverage

    May 6, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202571 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202568 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202571 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202568 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.