Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    This experimental camera can focus on everything at once

    This experimental camera can focus on everything at once

    December 29, 2025
    Xiaomi’s 17 Ultra Leica edition has a rotatable camera zoom

    Xiaomi’s 17 Ultra Leica edition has a rotatable camera zoom

    December 29, 2025
    Google Photos is coming to Samsung TVs in 2026

    Google Photos is coming to Samsung TVs in 2026

    December 29, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
    Security

    A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    News RoomBy News RoomOctober 16, 20254 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data in less than 30 seconds.

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

    Like Taking a Screenshot

    Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

    “Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” the researchers wrote on an informational website. “Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible. If an app has secret information that is not visible (e.g., it has a secret key that is stored but never shown on the screen), that information cannot be stolen by Pixnapping.”

    The new attack class is reminiscent of GPU.zip, a 2023 attack that allowed malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites. It worked by exploiting side channels found in GPUs from all major suppliers. The vulnerabilities that GPU.zip exploited have never been fixed. Instead, the attack was blocked in browsers by limiting their ability to open iframes, an HTML element that allows one website (in the case of GPU.zip, a malicious one) to embed the contents of a site from a different domain.

    Pixnapping targets the same side channel as GPU.zip, specifically the precise amount of time it takes for a given frame to be rendered on the screen.

    “This allows a malicious app to steal sensitive information displayed by other apps or arbitrary websites, pixel by pixel,” Alan Linghao Wang, lead author of the research paper “Pixnapping: Bringing Pixel Stealing out of the Stone Age,” explained in an interview. “Conceptually, it is as if the malicious app was taking a screenshot of screen contents it should not have access to. Our end-to-end attacks simply measure the rendering time per frame of the graphical operations to determine whether the pixel was white or nonwhite.”

    Pixnapping in 3 Steps

    The attack occurs in three main steps. In the first, the malicious app invokes Android APIs that make calls to the app the attacker wants to snoop on. These calls can also be used to effectively scan an infected device for installed apps of interest. The calls can further cause the targeted app to display specific data it has access to, such as a message thread in a messaging app or a 2FA code for a specific site. This call causes the information to be sent to the Android rendering pipeline, the system that takes each app’s pixels so they can be rendered on the screen. The Android-specific calls made include activities, intents, and tasks.

    In the second step, Pixnapping performs graphical operations on individual pixels that the targeted app sent to the rendering pipeline. These operations choose the coordinates of target pixels the app wants to steal and begin to check if the color of those coordinates is white or nonwhite or, more generally, if the color is c or non-c (for an arbitrary color c).

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleApple TV and Peacock announce a discounted $15 monthly subscription bundle
    Next Article Amazon shares a ‘first look’ at new nuclear facility

    Related Posts

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    Cloudflare Has Blocked 416 Billion AI Bot Requests Since July 1

    December 6, 2025
    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

    December 5, 2025
    Your Data Might Determine How Much You Pay for Eggs

    Your Data Might Determine How Much You Pay for Eggs

    December 4, 2025
    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    Russia Wants This Mega Missile to Intimidate the West, but It Keeps Crashing

    December 4, 2025
    This Hacker Conference Installed a Literal Antivirus Monitoring System

    This Hacker Conference Installed a Literal Antivirus Monitoring System

    December 4, 2025
    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    Flock Uses Overseas Gig Workers to Build Its Surveillance AI

    December 4, 2025
    Our Picks
    Xiaomi’s 17 Ultra Leica edition has a rotatable camera zoom

    Xiaomi’s 17 Ultra Leica edition has a rotatable camera zoom

    December 29, 2025
    Google Photos is coming to Samsung TVs in 2026

    Google Photos is coming to Samsung TVs in 2026

    December 29, 2025
    LG announces new UltraGear evo gaming monitors with AI upscaling

    LG announces new UltraGear evo gaming monitors with AI upscaling

    December 28, 2025
    Ubisoft shuts down ‘Rainbow Six Siege’ servers following hack

    Ubisoft shuts down ‘Rainbow Six Siege’ servers following hack

    December 28, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Samsung will debut two new wireless speakers at CES 2026 News

    Samsung will debut two new wireless speakers at CES 2026

    By News RoomDecember 27, 2025

    For years, Samsung has made products that try to camouflage what they are by displaying…

    Pixel 10 phones and Switch 2 games round out this week’s best deals 

    Pixel 10 phones and Switch 2 games round out this week’s best deals 

    December 27, 2025
    Rodeo is an app for making plans with friends you already have

    Rodeo is an app for making plans with friends you already have

    December 26, 2025
    Framework announces another memory price hike — and it likely won’t be its last

    Framework announces another memory price hike — and it likely won’t be its last

    December 26, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.