Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Android Flaw Lets Apps Steal 2FA Codes

October 15, 2025
Reading Time: 3 mins read
in Alerts
Android Flaw Lets Apps Steal 2FA Codes

Pixnapping is a new type of side-channel attack that targets Android devices. It’s a “pixel-stealing” framework that can covertly siphon data from both browser and non-browser apps, like Google Authenticator. The attack works by taking advantage of a hardware side-channel present in integrated GPUs and a combination of Android APIs. It’s so fast that it can steal a two-factor authentication (2FA) code in under 30 seconds. The researchers behind the discovery named the attack Pixnapping.

At its core, the Pixnapping attack weaponizes a GPU compression feature called GPU.zip, which was previously identified as a vulnerability for browser-based attacks. The researchers found that they could combine this with Android’s window blur API to leak rendering data from other apps. A malicious app, even one without special permissions, sends the pixels of a target app (containing sensitive data like a 2FA code) into the Android rendering pipeline. It then overlays semi-transparent activities to analyze and transmit the pixels, repeating this process for each pixel to steal the full image.

According to the researchers, Android is vulnerable to this attack due to three key factors. First, an app can use Android intents to send another app’s activities to the rendering pipeline. Second, a malicious app can use graphical operations like the blur function on the pixels of another app. Finally, the attack measures the color-dependent side effects of these graphical operations to determine the content of the pixels. This specific combination allows for the attack to occur.

Google has issued a patch for the vulnerability (identified as CVE-2025-48561) in its September 2025 Android Security Bulletin. The initial patch, however, only partially mitigated the issue, as researchers found a way to re-enable the attack by altering its timing. As a result, Google is preparing a second, more comprehensive patch to fully address the new attack vector in an upcoming security update. Google has stated that it has not seen any evidence of this exploit being used in the wild.

In addition to stealing sensitive data, the study also revealed that this attack can be used to bypass a security feature implemented in Android 11. Specifically, it can be used to determine if an arbitrary app is installed on the user’s device, which Android 11 and later versions are designed to prevent. This particular finding remains unpatched, with Google having marked it as “won’t fix.” The researchers suggest that a realistic solution for this type of vulnerability would be to allow sensitive apps to opt out of this behavior and to restrict the capabilities of a potential attacker.

Reference:

  • New Pixnapping Bug Allows Rogue Android Apps To Grab 2fa Codes Without Permission
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Intellexa Leak Exposes Predator Zero Days

Silver Fox Spreads ValleyRAT In China

December 5, 2025
Intellexa Leak Exposes Predator Zero Days

Intellexa Leak Exposes Predator Zero Days

December 5, 2025
Hackers Exploit ArrayOS AG VPN Flaw

Hackers Exploit ArrayOS AG VPN Flaw

December 5, 2025
WordPress Elementor Addon Flaw Exploited

Record DDoS Linked To Massive Botnet

December 4, 2025
WordPress Elementor Addon Flaw Exploited

RSC Bugs Let Hackers Run Remote Code Now

December 4, 2025
WordPress Elementor Addon Flaw Exploited

WordPress Elementor Addon Flaw Exploited

December 4, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial