Researchers have identified a new attack method that can allow malicious applications to steal sensitive data from Android ...
Google has only partially mitigated the attack, which involves using a malicious Android app to secretly discern the two-factor codes generated by authenticator apps.
Pixnapping was performed on five devices running Android versions 13 to 16: the Google Pixel 6, Google Pixel 7, Google Pixel 8, Google Pixel 9, and Samsung Galaxy S25. However, it is possible that ...
Researchers have detailed the Pixnapping attack on Android, which has inferred on-screen data and exposed seed phrases and ...
Researchers have discovered a new type of attack that can steal sensitive information on Android devices, like 2FA codes, ...
Researchers say that in the case of Google Authenticator, the Pixnapping vulnerability allows attackers to steal critical 2FA ...
Google is aware of a vulnerability that’s able to steal data from apps that are generally considered secure like ...
Nasty and it still works Security researchers have resurrected a 12-year-old data‑stealing browser attack and adapted it to ...
Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, ...
A new side-channel attack called Pixnapping enables a malicious Android app with no permissions to extract sensitive data by ...
Pixnapping side-channel can steal 2FA codes pixel-by-pixel on Android 13–16; CVE-2025-48561 patched Sept 2025 but workaround exists.
Pixnapping is a newly disclosed class of side-channel attacks that targets Android smartphones. The attack, conceived by researchers, would allow a malicious app to leak secret ...