• Blog
  • California Consumer Privacy Act (CCPA)
  • Cart
  • Checkout
  • Contact
  • DMCA
  • Home
  • My account
  • Privacy Policy
  • Shop
Wednesday, October 15, 2025
  • Login
Buyer's Insight
  • Home
  • Top Stories
  • Local News
    • Politics
    • Business & Economy
    • Entertainment
    • Sports
  • Health
  • Lifestyle
  • Science & Environment
  • Technology
  • Review Radar
    • Weight Loss Products Reviews
    • Forex Trading
    • Shop
  • Contact
No Result
View All Result
  • Home
  • Top Stories
  • Local News
    • Politics
    • Business & Economy
    • Entertainment
    • Sports
  • Health
  • Lifestyle
  • Science & Environment
  • Technology
  • Review Radar
    • Weight Loss Products Reviews
    • Forex Trading
    • Shop
  • Contact
No Result
View All Result
Buyer's Insight
No Result
View All Result

Hackers can steal 2FA codes and private messages from Android phones

James Walker by James Walker
October 14, 2025
in Technology
Reading Time: 2 mins read
0
0
SHARES
0
VIEWS

The new attack class is reminiscent of GPU.zip, a 2023 attack that allowed malicious websites to read usernames, passwords, and other sensitive visual data displayed by other websites. It worked by leveraging side channels found in GPUs from all major vendors. The vulnerabilities exploited by GPU.zip have never been fixed. Instead, the attack was blocked in browsers by limiting their ability to open iframes, an HTML element that allows a website (in the case of GPU.zip, a malicious site) to embed content from a site from a different domain.

Pixnapping targets the same side channel as GPU.zip, specifically the precise time it takes for a given frame to render on screen.

“This allows a malicious application to steal sensitive information displayed by other applications or arbitrary websites, pixel by pixel,” Alan Linghao Wang, lead author of the research paper “Pixnapping: Bringing Pixel Stealing out of the Stone Age,” explained in an interview. “Conceptually, it’s as if the malicious application took a screenshot of screen content that it shouldn’t have access to. Our end-to-end attacks simply measure the per-frame rendering time of graphics operations… to determine whether the pixel was white or non-white.”

Pixnapping in three steps

The attack takes place in three main stages. In the first case, the malicious application calls Android APIs that call the application that the attacker wants to spy on. These calls can also be used to effectively scan an infected device for installed interesting apps. Calls can further cause the targeted app to display specific data that it has access to, such as a thread in a messaging app or a 2FA code for a specific site. This call causes information to be sent to the Android rendering pipeline, the system that takes pixels from each app so they can be rendered on the screen. Android-specific calls made include Activities, Intents, and Tasks.

Post Views: 0
Tags: 2FAAndroidcodesHackersmessagesphonesprivatesteal
Previous Post

Bari Weiss memo sparks confusion at CBS News

Next Post

Too many speculative names fueled Monday’s rally, says Jim Cramer

Related Posts

Technology

The new powerful MacBook Pro M5 teased by Greg Joswiak

October 15, 2025
Technology

Inaudible sound could be the next frontier in wildfire defense

October 15, 2025
Technology

Apple SVP explains why they dropped ‘Plus’ from Apple TV and hints at subscriber numbers

October 15, 2025
Technology

Pokémon Teraleak Reveals Unannounced Games, Apparently Showcasing Major Franchise Releases Through 2030

October 15, 2025
Technology

Samsung officially teases Moohan headset launch for next week

October 15, 2025
Technology

Google’s new foldable Pixel bends and breaks during stress test, again

October 15, 2025
Next Post

Too many speculative names fueled Monday's rally, says Jim Cramer

News Net Daily

  • Home
  • California Consumer Privacy Act (CCPA)
  • Contact
  • DMCA
  • Privacy Policy

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Top Stories
  • Local News
    • Politics
    • Business & Economy
    • Entertainment
    • Sports
  • Health
  • Lifestyle
  • Science & Environment
  • Technology
  • Review Radar
    • Weight Loss Products Reviews
    • Forex Trading
    • Shop
  • Contact