Android devices Vulnerable to a recent attack that can infiltrate stealing two important authentication codes, location orasa, and other private data in less than 30 seconds.
The new attack, named Pixnapping on the team of academical researchers who planned it, requires the victim of installing a malicious app on an Android phone. The app, which requires no system permission, it may be effective to read the data with any other installs displayed on the screen app. Pixnapping shows Google Pixel Phones and the Samsung Galaxy S25 phone and is likely to be changed to work with other models with additional work. Google releases the exploits of last month, but researchers say a revised version of attacks at work even when the update is installed.
Like to get a screenshot
Pixnapping attacks start with malicious app that encourages Android interfaces that cause authentication or other target apps on the device’s sensitive app. The harmful app then runs on graphic operations of individual attackers’ interest pixels. Pixnapping is immediately exploited CANAL that allows malicious app to map the pixels of coordinates of letters, numbers, or forms.
“Anything to see if the target app is opened can be stolen at the malicious app using pizenpae,” researchers write to a Website website. “Chat messages, 2fa messages, email messages, and so on everything is weak because it appears secret key
The new class of attack remembers the Gpu.zipA 2023 attack that allows harmful websites to read usernames, passwords, and other sensitive visual data displayed on other websites. It works by exploiting the ditches on the side found by GPU from all major suppliers. GPU.ZIP vulnerabilities have been exploited. However, attacks are blocked by browsers by limiting their ability to open IFRAMES, an HTML element that allows a webmage (in case of GPU.ZIP, a wicked way) to get a single-way) to get the content of a site from different domain.
Pixnapping targets the same side channel as GPU.zip, particularly accurate amounts of time required for a given frame provided on the screen.






