Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Overwatch’s Heroes Are Getting Hotter, Here’s Why

    February 4, 2026

    Taylor Sheridan’s TV Shows, Ranked Worst to Best

    February 4, 2026

    BMW i3 Enters Final Pre-Production Phase Ahead of 2026 Global Launch

    February 4, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Hackers can steal 2FA codes and private messages from Android phones
    Hackers can steal 2FA codes and private messages from Android phones
    Tech Reviews

    Hackers can steal 2FA codes and private messages from Android phones

    gvfx00@gmail.comBy gvfx00@gmail.comOctober 14, 2025No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Android devices are vulnerable to a new attack that can covertly steal 2FA codes, location timelines, and other private data in less than 30 seconds.

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

    Table of Contents

    Toggle
    • Like taking a screenshot
      • Related posts:
    • I’ve Carried at Least 4 Wallets a Day for a Year to Test the Best Minimalist Wallets. These Are My F...
    • Researchers question Anthropic claim that AI-assisted attack was 90% autonomous
    • 'They're as robust as they can be while being comfortable for most users': a Dyson engineer reveals ...

    Like taking a screenshot

    Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

    “Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” the researchers wrote on an informational website. “Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible. If an app has secret information that is not visible (e.g., it has a secret key that is stored but never shown on the screen), that information cannot be stolen by Pixnapping.”

    The new attack class is reminiscent of GPU.zip, a 2023 attack that allowed malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites. It worked by exploiting side channels found in GPUs from all major suppliers. The vulnerabilities that GPU.zip exploited have never been fixed. Instead, the attack was blocked in browsers by limiting their ability to open iframes, an HTML element that allows one website (in the case of GPU.zip, a malicious one) to embed the contents of a site from a different domain.

    Related posts:

    Best Internet Providers in Seattle, Washington

    What is the release date for Landman season 2 episode 10 on Paramount+?

    Spotify Adds New Social Listening Features on Mobile. Here's How to Use Them

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAIAllure Free vs Paid Plan Comparison
    Next Article What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    This Ring Video Doorbell changed how I monitor my home — and 10,000+ people bought it last month

    February 4, 2026
    Tech Reviews

    Broadcom Unveils Comprehensive Enterprise Wi-Fi 8 AP and AI Switch Platforms

    February 4, 2026
    Tech Reviews

    Nvidia’s $100 billion OpenAI deal has seemingly vanished

    February 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.