Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Pixnapping Attack Steals Data From Google, Samsung Android Phones

Posted on October 14, 2025October 14, 2025 By CWS

A group of researchers at Carnegie Mellon College has recognized a brand new assault methodology that may enable malicious functions to steal delicate information from Android units. 

Named Pixnapping, the assault has been demonstrated in opposition to Google and Samsung telephones. Google has launched one patch for the Android working system and is engaged on a further repair to guard units in opposition to potential assaults. 

To be able to launch a Pixnapping assault, an attacker has to trick the focused consumer into putting in a malicious utility on their Android telephone. The malicious app doesn’t want any Android permissions so as to conduct an assault.

Based on the researchers, the assault begins with the malicious app invoking the appliance from which information shall be stolen. It then induces graphical operations on pixels within the focused app which are identified to be related to a area of the display screen the place delicate information is usually displayed. The GPU side-channel assault named GPU.zip, which researchers disclosed again in 2023, is then used to steal the focused pixels, one pixel at a time. 

These operations happen within the background whereas the sufferer is viewing the malicious utility. 

“Pixnapping forces delicate pixels into the rendering pipeline and overlays semi-transparent actions on high of these pixels through Android intents. To induce graphical operations on these pixels, our instantiations use Android’s window blur API. To measure rendering time, our instantiations use VSync callbacks,” the researchers defined.

“Conceptually, it’s as if the malicious app was taking a screenshot of display screen contents it mustn’t have entry to,” they added. 

The researchers efficiently reproduced the assault on Pixel and Samsung telephones, however they imagine units from different distributors are possible weak as properly. Throughout their assessments, they managed to get well delicate information from web sites resembling Gmail and Google Accounts, in addition to apps resembling Venmo, Sign, Google Authenticator, and Google Maps.Commercial. Scroll to proceed studying.

The Pixnapping assault can be utilized to steal delicate information resembling 2FA codes, emails, and chat messages, however solely data that’s seen on the display screen is weak. 

Lots of the researchers’ assessments focused Google Authenticator, from which they managed to steal 2FA codes in underneath 30 seconds (the pace of the assault is vital on this case as 2FA codes in Authenticator expire after 30 seconds). Google Authenticator makes for a very good goal because the place of the 2FA code on the display screen is very predictable, enabling its theft pixel by pixel.

Nevertheless, throughout their assessments the researchers achieved a hit price ranging between 29% and 73% on Pixel units for the restoration of 2FA codes from the Google Authenticator app. On Samsung Galaxy S25 they have been unable to get well the codes inside 30 seconds. 

Google was knowledgeable in regards to the vulnerability in February 2025. The CVE identifier CVE-2025-48561 was later assigned and a patch was rolled out with the Android updates launched in September. The researchers have managed to bypass Google’s patch and the tech big is now engaged on a further repair that ought to grow to be out there in December.

Google informed SecurityWeek that it has not seen any proof of in-the-wild exploitation. The tech big additionally famous that, primarily based on its present detections, no malicious apps exploiting this vulnerability have been discovered on Google Play.

Associated: Apple Bug Bounty Replace: High Payout $2 Million, $35 Million Paid to Date

Associated: Decade-Previous Pixie Mud Wi-Fi Hack Nonetheless Impacts Many Units

Associated: Samsung Patches Zero-Day Exploited In opposition to Android Customers

Security Week News Tags:Android, Attack, Data, Google, Phones, Pixnapping, Samsung, Steals

Post navigation

Previous Post: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing
Next Post: How Threat Hunting Builds Readiness

Related Posts

Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign Security Week News
Chinese Hackers Hit Drone Sector in Supply Chain Attacks Security Week News
Beyond the Prompt: Building Trustworthy Agent Systems Security Week News
From Ex Machina to Exfiltration: When AI Gets Too Curious Security Week News
Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security Security Week News
CISO Conversations: Are Microsoft’s Deputy CISOs a Signpost to the Future? Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely
  • New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
  • Adobe Patches Critical Vulnerability in Connect Collaboration Suite
  • Microsoft Patches 173 Vulnerabilities, Including Exploited Windows Flaws
  • Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely
  • New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
  • Adobe Patches Critical Vulnerability in Connect Collaboration Suite
  • Microsoft Patches 173 Vulnerabilities, Including Exploited Windows Flaws
  • Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News