Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
You’ll soon be able to cap your MacBook’s charge at 80 percent to preserve battery health

You’ll soon be able to cap your MacBook’s charge at 80 percent to preserve battery health

17 February 2026
This Dreame robot vacuum does the “hands-off” thing for real, and it’s down to 9.99

This Dreame robot vacuum does the “hands-off” thing for real, and it’s down to $299.99

17 February 2026
iOS 26.4 puts your iPhone in anti-theft mode by default

iOS 26.4 puts your iPhone in anti-theft mode by default

17 February 2026
Facebook X (Twitter) Instagram
Just In
  • You’ll soon be able to cap your MacBook’s charge at 80 percent to preserve battery health
  • This Dreame robot vacuum does the “hands-off” thing for real, and it’s down to $299.99
  • iOS 26.4 puts your iPhone in anti-theft mode by default
  • The Simplest Android App for Scanning Documents
  • Paranormasight: The Mermaid’s Curse Review – A Spine-Tingling Dive
  • Nothing is ready for March 5 event with the new 4a series phones
  • Inside the Homeland Security Forum Where ICE Agents Talk Shit About Other Agents
  • Apple’s Podcast glow-up brings video, ads, and offline viewing
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
News

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

News RoomBy News Room15 October 20252 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
Share
Facebook Twitter LinkedIn Pinterest Email

Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data in less than 30 seconds.

The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

Like Taking a Screenshot

Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

“Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” the researchers wrote on an informational website. “Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible. If an app has secret information that is not visible (e.g., it has a secret key that is stored but never shown on the screen), that information cannot be stolen by Pixnapping.”

The new attack class is reminiscent of GPU.zip, a 2023 attack that allowed malicious websites to read the usernames, passwords, and other sensitive visual data displayed by other websites. It worked by exploiting side channels found in GPUs from all major suppliers. The vulnerabilities that GPU.zip exploited have never been fixed. Instead, the attack was blocked in browsers by limiting their ability to open iframes, an HTML element that allows one website (in the case of GPU.zip, a malicious one) to embed the contents of a site from a different domain.

Pixnapping targets the same side channel as GPU.zip, specifically the precise amount of time it takes for a given frame to be rendered on the screen.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleA Quarter of the CDC Is Gone
Next Article Mark Cuban Would Still Have Dinner With Donald Trump

Related Articles

You’ll soon be able to cap your MacBook’s charge at 80 percent to preserve battery health
News

You’ll soon be able to cap your MacBook’s charge at 80 percent to preserve battery health

17 February 2026
This Dreame robot vacuum does the “hands-off” thing for real, and it’s down to 9.99
News

This Dreame robot vacuum does the “hands-off” thing for real, and it’s down to $299.99

17 February 2026
iOS 26.4 puts your iPhone in anti-theft mode by default
News

iOS 26.4 puts your iPhone in anti-theft mode by default

17 February 2026
The Simplest Android App for Scanning Documents
News

The Simplest Android App for Scanning Documents

17 February 2026
Nothing is ready for March 5 event with the new 4a series phones
News

Nothing is ready for March 5 event with the new 4a series phones

17 February 2026
Inside the Homeland Security Forum Where ICE Agents Talk Shit About Other Agents
News

Inside the Homeland Security Forum Where ICE Agents Talk Shit About Other Agents

17 February 2026
Demo
Top Articles
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024126 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024110 Views
Costco partners with Electric Era to bring back EV charging in the U.S.

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202498 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Nothing is ready for March 5 event with the new 4a series phones News

Nothing is ready for March 5 event with the new 4a series phones

News Room17 February 2026
Inside the Homeland Security Forum Where ICE Agents Talk Shit About Other Agents News

Inside the Homeland Security Forum Where ICE Agents Talk Shit About Other Agents

News Room17 February 2026
Apple’s Podcast glow-up brings video, ads, and offline viewing News

Apple’s Podcast glow-up brings video, ads, and offline viewing

News Room17 February 2026
Most Popular
The Spectacular Burnout of a Solar Panel Salesman

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025137 Views
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024126 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024110 Views
Our Picks
The Simplest Android App for Scanning Documents

The Simplest Android App for Scanning Documents

17 February 2026
Paranormasight: The Mermaid’s Curse Review – A Spine-Tingling Dive

Paranormasight: The Mermaid’s Curse Review – A Spine-Tingling Dive

17 February 2026
Nothing is ready for March 5 event with the new 4a series phones

Nothing is ready for March 5 event with the new 4a series phones

17 February 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2026 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.