Skip to main content
institutional access

You are connecting from
Lake Geneva Public Library,
please login or register to take advantage of your institution's Ground News Plan.

Published loading...Updated

New Attack Alert As Android 2FA Codes Stolen In 30 Seconds Flat

Pixnapping malware exploits Android OS graphics features to steal two-factor authentication codes with success rates up to 73% on Pixel devices, researchers found.

  • On Monday, researchers from the University of California, Berkeley, University of Washington, University of California, San Diego and Carnegie Mellon University demonstrated Pixnapping can steal 2FA codes from Google Pixel and Samsung Galaxy phones in under 30 seconds.
  • The attack exploits Android OS standard APIs and a hardware side‑channel, using the Intents function to send activities into the rendering pipeline and infer pixels.
  • Different Pixel devices recorded 73%, 53%, 29%, and 53% success rates for the Pixel 6, 7, 8, and 9, with average recovery times of 14.3 to 25.8 seconds.
  • Google issued a partial September Android security patch for CVE‑2025‑48561, but researchers demonstrated a workaround; Google plans an additional patch in the December Android security bulletin with no known exploitation.
  • Users are advised to install the latest security patches and avoid untrusted apps since Pixnapping requires installing and opening a malicious app on Android devices.
Insights by Ground AI

14 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 50% of the sources are Center
50% Center

Factuality 

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

digitalinformationworld.com broke the news in on Tuesday, October 14, 2025.
Sources are mostly out of (0)
News
For You
Search
BlindspotLocal