December 10, 2025

Web and Technology News

Hackers can steal 2FA codes and private messages from Android phones

Android devices are vulnerable to a new attack that can covertly steal 2FA codes, location timelines, and other private data in less than 30 seconds.

The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

Like taking a screenshot

Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

Read full article

Comments

Previous Article

Grindr’s owners may take it private after a financial squeeze

Next Article

Critical Oracle EBS Flaw Could Expose Sensitive Data

You might be interested in …

Why web3 companies get hacked so often, according to crypto VC Grace Isford

On the Chain Reaction podcast this week, Lux Capital’s newest investor, Grace Isford, joined us to talk about the opaque but crucial world of web3 infrastructure. At Lux, Isford invests in the companies working behind the scenes to make sure crypto exchanges are secure and reliable enough to avoid being hacked. Before joining Lux this February, […]

Leave a Reply

Your email address will not be published. Required fields are marked *