A New Attack allows hackers who steal 2-factor authentication codes from Android phones


Android devices Vulnerable to a recent attack that can infiltrate stealing two important authentication codes, location orasa, and other private data in less than 30 seconds.

The new attack, named Pixnapping on the team of academical researchers who planned it, requires the victim of installing a malicious app on an Android phone. The app, which requires no system permission, it may be effective to read the data with any other installs displayed on the screen app. Pixnapping shows Google Pixel Phones and the Samsung Galaxy S25 phone and is likely to be changed to work with other models with additional work. Google releases the exploits of last month, but researchers say a revised version of attacks at work even when the update is installed.

Like to get a screenshot

Pixnapping attacks start with malicious app that encourages Android interfaces that cause authentication or other target apps on the device’s sensitive app. The harmful app then runs on graphic operations of individual attackers’ interest pixels. Pixnapping is immediately exploited CANAL that allows malicious app to map the pixels of coordinates of letters, numbers, or forms.

“Anything to see if the target app is opened can be stolen at the malicious app using pizenpae,” researchers write to a Website website. “Chat messages, 2fa messages, email messages, and so on everything is weak because it appears secret key

The new class of attack remembers the Gpu.zipA 2023 attack that allows harmful websites to read usernames, passwords, and other sensitive visual data displayed on other websites. It works by exploiting the ditches on the side found by GPU from all major suppliers. GPU.ZIP vulnerabilities have been exploited. However, attacks are blocked by browsers by limiting their ability to open IFRAMES, an HTML element that allows a webmage (in case of GPU.ZIP, a wicked way) to get a single-way) to get the content of a site from different domain.

Pixnapping targets the same side channel as GPU.zip, particularly accurate amounts of time required for a given frame provided on the screen.



Source link

  • Related Posts

    Megabonk was removed from the game awards

    Nominated for game awards released Yesterday, and there was a whole lot of indie skill on display. However, a prominent contender among them decided to withdraw from the contention. The…

    You can move to Minnesota to escape the data epidemic

    Data centers dominate the world, and chances are high that someone, right this minute, is planning to build one in (or nearby) your backyard. Because the Ai Boom continues, and…

    Leave a Reply

    Your email address will not be published. Required fields are marked *