Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions

Posted on October 14, 2025October 14, 2025 By CWS

Oct 14, 2025Ravie LakshmananVulnerability / Cell Safety
Android units from Google and Samsung have been discovered weak to a side-channel assault that may very well be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and different delicate information with out the customers’ data pixel-by-pixel.
The assault has been codenamed Pixnapping by a gaggle of teachers from the College of California (Berkeley), College of Washington, College of California (San Diego), and Carnegie Mellon College.
Pixnapping, at its core, is a pixel-stealing framework aimed toward Android units in a way that bypasses browser mitigations and even siphons information from non-browser apps like Google Authenticator by making the most of Android APIs and a {hardware} side-channel, permitting a malicious app to weaponize the approach to seize 2FA codes in underneath 30 seconds.
“Our key commentary is that Android APIs allow an attacker to create an analog to [Paul] Stone-style assaults outdoors of the browser,” the researchers mentioned in a paper. “Particularly, a malicious app can pressure sufferer pixels into the rendering pipeline through Android intents and compute on these sufferer pixels utilizing a stack of semi-transparent Android actions.”
The examine particularly centered on 5 units from Google and Samsung operating Android variations 13 to 16, and whereas it isn’t clear if Android units from different unique gear producers (OEMs) are prone to Pixnapping, the underlying methodology crucial to tug off the assault is current in all units operating the cell working system.

What makes the novel assault important is that any Android app can be utilized to execute it, even when the appliance doesn’t have any particular permissions hooked up through its manifest file. Nevertheless, the assault presupposes that the sufferer has been satisfied by another means to put in and launch the app.
The side-channel that makes Pixnapping potential is GPU.zip, which was disclosed by a number of the identical researchers again in September 2023. The assault primarily takes benefit of a compression function in trendy built-in GPUs (iGPUs) to carry out cross-origin pixel stealing assaults within the browser utilizing SVG filters.
Overview of our pixel stealing framework
The most recent class of assault combines this with Android’s window blur API to leak rendering information and allow theft from sufferer apps. In an effort to accomplish this, a malicious Android app is used to ship sufferer app pixels into the rendering pipeline and overlay semi-transparent actions utilizing intents – an Android software program mechanism that permits for navigation between functions and actions.

In different phrases, the thought is to invoke a goal app containing info of curiosity (e.g., 2FA codes) and trigger the info to be submitted for rendering, following which the rogue app put in the system isolates the coordinates of a goal pixel (i.e., ones which include the 2FA code) and induces a stack of semi-transparent actions to masks, enlarge, and transmit that pixel utilizing the side-channel. This step is then repeated for each pixel pushed to the rendering pipeline.

The researchers mentioned Android is weak to Pixnapping resulting from a mix of three components that permit an app to –
Ship one other app’s actions to the Android rendering pipeline (e.g., with intents)Induce graphical operations (e.g., blur) on pixels displayed by one other app’s activitiesMeasure the pixel color-dependent unwanted side effects of graphical operations

Google is monitoring the difficulty underneath the CVE identifier CVE-2025-48561 (CVSS rating: 5.5). Patches for the vulnerability have been issued by the tech large as a part of its September 2025 Android Safety Bulletin, with Google noting that: “An software requesting heaps and plenty of blurs: (1) permits pixel stealing by measuring how lengthy it takes to carry out a blur throughout home windows, [and] (2) most likely is not very legitimate anyhow.”

Nevertheless, it has since come to mild that there exists a workaround that can be utilized to re-enable Pixnapping. The corporate is claimed to be engaged on a repair.
Moreover, the examine discovered that as a consequence of this conduct, it is potential for an attacker to find out if an arbitrary app is put in on the system, bypassing restrictions applied since Android 11 that forestall querying the checklist of all put in apps on a person’s system. The app checklist bypass stays unpatched, with Google marking it as “will not repair.”
“Like browsers firstly, the deliberately collaborative and multi-actor design of cell app layering makes the plain restrictions unappealing,” the researchers concluded.
“App layering isn’t going away, and layered apps can be ineffective with a no-third-party-cookies model of restriction. A sensible response is making the brand new assaults as unappealing because the previous ones: permit delicate apps to choose out and limit the attacker’s measurement capabilities in order that any proof-of-concept stays simply that.”

The Hacker News Tags:2FA, Android, Apps, Codes, Flaw, Lets, Permissions, Pixnapping, Rogue, Steal

Post navigation

Previous Post: What AI Reveals About Web Applications— and Why It Matters
Next Post: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing

Related Posts

LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer The Hacker News
Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data The Hacker News
A Pragmatic Approach To NHI Inventories  The Hacker News
New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module The Hacker News
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign The Hacker News
Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched
  • Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks
  • Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
  • HyperBunker Raises Seed Funding to Launch Next-Generation Anti-Ransomware Device
  • Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched
  • Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks
  • Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
  • HyperBunker Raises Seed Funding to Launch Next-Generation Anti-Ransomware Device
  • Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News