Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Japan beat Australia to lift Women’s Asian Cup title | Football News

    March 21, 2026

    The Better Way For Document Chatbots?

    March 21, 2026

    Synology BeeCamera Review: BeeStation Plus’ Cool Surveillance Add-on Feature

    March 21, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Hackers can steal 2FA codes and private messages from Android phones
    Hackers can steal 2FA codes and private messages from Android phones
    Tech Reviews

    Hackers can steal 2FA codes and private messages from Android phones

    gvfx00@gmail.comBy gvfx00@gmail.comOctober 14, 2025No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Android devices are vulnerable to a new attack that can covertly steal 2FA codes, location timelines, and other private data in less than 30 seconds.

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

    Table of Contents

    Toggle
    • Like taking a screenshot
      • Related posts:
    • Peloton updates its Bike, Tread and Row machines with form-checking cameras, rotating screens and lo...
    • Today's NYT Mini Crossword Answers for Dec. 29
    • SpaceX will attempt Starship's 11th flight test on Monday

    Like taking a screenshot

    Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

    “Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” the researchers wrote on an informational website. “Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible. If an app has secret information that is not visible (e.g., it has a secret key that is stored but never shown on the screen), that information cannot be stolen by Pixnapping.”

    The new attack class is reminiscent of GPU.zip, a 2023 attack that allowed malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites. It worked by exploiting side channels found in GPUs from all major suppliers. The vulnerabilities that GPU.zip exploited have never been fixed. Instead, the attack was blocked in browsers by limiting their ability to open iframes, an HTML element that allows one website (in the case of GPU.zip, a malicious one) to embed the contents of a site from a different domain.

    Related posts:

    UniFi Device Bridge UDB Switch Review: Ubiquiti's Solid Wi-Fi 7-to-PoE Solution

    Microsoft drops AI sales targets in half after salespeople miss their quotas

    Best UniFi Cloud Gateways (Routers): 2026's Top 5

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAIAllure Free vs Paid Plan Comparison
    Next Article What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Synology BeeCamera Review: BeeStation Plus’ Cool Surveillance Add-on Feature

    March 21, 2026
    Tech Reviews

    Widely used Trivy scanner compromised in ongoing supply-chain attack

    March 21, 2026
    Tech Reviews

    Elon Musk misled investors during his Twitter takeover, jury finds

    March 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.