Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

At Starbase, SpaceX is doing its own firefighting.

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Pixnapping flaw in Android could allow malicious apps to steal 2FA codes without permission
Identity

New Pixnapping flaw in Android could allow malicious apps to steal 2FA codes without permission

userBy userOctober 14, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 14, 2025Ravi LakshmananVulnerabilities / Mobile Security

Pixnapping Android flaws

Android devices from Google and Samsung have been found to be vulnerable to side-channel attacks that can be exploited to secretly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data pixel by pixel without the user’s knowledge.

The attack was codenamed “Pixnapping” by a group of academics from the University of California (Berkeley), the University of Washington, the University of California (San Diego), and Carnegie Mellon University.

At its core, Pixnapping is a pixel theft framework aimed at Android devices by bypassing browser mitigations and leveraging Android APIs and hardware side channels to siphon data from non-browser apps such as Google Authenticator. This allows malicious apps to weaponize techniques to capture 2FA codes within 30 seconds.

“Our key observation is that the Android API allows attackers to create something similar. [Paul] “Specifically, a malicious app could force a victim pixel into the rendering pipeline via an Android intent and use a translucent stack of Android activities to calculate the victim pixel,” the researchers wrote in their paper.

While this research specifically focused on five devices from Google and Samsung running Android versions 13 to 16, and it is not clear whether Android devices from other original equipment manufacturers (OEMs) are susceptible to Pixnapping, the basic techniques needed to carry out the attack are present on all devices running mobile operating systems.

DFIR retainer service

The significance of this new attack is that it can be executed using an Android app even if the application is not granted special permissions through its manifest file. However, this attack relies on the victim being persuaded to install and launch the app through other means.

The side channel that enables Pixnapping is GPU.zip, which was published by some of the same researchers in September 2023. This attack essentially leverages the compression capabilities of modern integrated GPUs (iGPUs) to perform a cross-origin pixel theft attack within the browser using an SVG filter.

Pixel Steel Framework Overview

The latest attack class combines this with Android’s window blurring API to leak rendering data and enable theft from the victim app. To accomplish this, a malicious Android app sends the victim app’s pixels to the rendering pipeline and is used to overlay a translucent activity using intents, an Android software mechanism that allows navigation between applications and activities.

In other words, the idea is to call the target app with the information you’re interested in (such as a 2FA code) and have it send the data for rendering. A malicious app installed on the device then isolates the coordinates of the target pixel (i.e., the pixel containing the 2FA code) and directs a stack of translucent activities to mask, magnify, and transmit that pixel using side channels. This step is repeated for each pixel pushed into the rendering pipeline.

The researchers said that Android is vulnerable to Pixnapping due to a combination of three factors that make apps able to:

Send another app’s activity to the Android rendering pipeline (for example, using an intent) to induce a graphical operation (for example, blur) on the pixels displayed by another app’s activity. Measures pixel color-dependent side effects of graphic operations.

Google is tracking this issue with CVE identifier CVE-2025-48561 (CVSS score: 5.5). A patch for this vulnerability was issued by the tech giant as part of its September 2025 Android Security Bulletin, with Google stating: “An application requests too many blurs: (1) it enables pixel theft by measuring the time it takes to perform the blur across the window; [and] In any case, (2) is probably not very valid. ”

CIS build kit

However, it has since been discovered that there is a workaround that can be used to re-enable Pixnapping. The company is said to be working on a fix.

Additionally, this research found that as a result of this behavior, an attacker may be able to determine whether any apps are installed on a user’s device, bypassing a restriction implemented since Android 11 that prohibits querying the list of all apps installed on a user’s device. App list bypass remains unpatched and Google has marked it as “not fixed.”

The researchers concluded, “Like the original browser, mobile app layering is an intentionally collaborative, multi-actor design that makes obvious limitations unattractive.”

“App layering is here to stay, and third-party cookie-free style restrictions won’t help layered apps. A practical response is to make new attacks as unattractive as old ones: opt out of sensitive apps, limit attackers’ ability to measure, and ensure proofs of concept remain intact.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSmart ring maker Oura raises $900 million from Fidelity
Next Article SpaceX ends action-packed Starship V2 era as program moves to V3
user
  • Website

Related Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025

A single 8-byte write shatters AMD’s SEV-SNP Confidential Computing security

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

At Starbase, SpaceX is doing its own firefighting.

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Aquawise unveils AI-powered water quality technology at TechCrunch Disrupt 2025

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.