#pixnapping

ℵ₀ 🏳️‍⚧️🏴‍☠️null_aleph
2025-11-13
Thorsten Leemhuis (acct. 2/4)knurd42@social.linux.pizza
2025-10-30

And this is why not just any program can take screenshots on most #Wayland compositors:

pixnapping.com/

Google despite the difficulties when exploiting this, classified #Pixnapping as "High Severity".

Screenshot from the head of the linked page, including the first paragraph
Thorsten Leemhuis (acct. 4/4)thleemhuisfoss@social.tchncs.de
2025-10-30

Hier ein Reminder, warum bei den meisten #Wayland-Compositoren nicht jedes X-beliebige Programm Screenshots machen darf, schließlich stufte Google die #Pixnapping-Lücke trotz ihrer Widrigkeiten als "High Severity" ein:

pixnapping.com/

Screenshot vom Kopf des verlinkten webseite, inkl. erster absatz
2025-10-15
2025-10-15

A New #Attack Lets #Hackers Steal 2-Factor #Authentication Codes From #Android Phones

The malicious app required to make a “Pixnapping” attack work requires no permissions.
#Pixnapping #security #2fa

wired.com/story/a-new-attack-l

2025-10-15

Tremenda virguería de vulnerabilidad en Android. Provoca una mezcla de pánico y ganas de levantarse a aplaudir bastante desconcertante :flan_hacker: :flan_yikes: :flan_guns:

pixnapping.com/

#android #seguridad #mfa #2fa #pixnapping

N-gated Hacker Newsngate
2025-10-15

🚨 Alert: is now a buffet for hackers! 🍽️ Thanks to "Pixnapping," the latest malady where evil apps can swipe your secrets faster than you can say "Oops!" Google and Samsung phones are wide open, but hey, at least they serve your 2FA codes on a silver platter! 🥳🔓
pixnapping.com/

Tecnoblog • tecnologia que interessatecnoblog.net@web.brid.gy
2025-10-14
<figure class="wp-block-image size-large wp-lightbox-container"><img alt="Ilustração com dois cadeados, representando segurança" class="wp-image-666323" height="596" src="https://files.tecnoblog.net/wp-content/uploads/2023/01/seguranca-capa-3-1060x596.png" width="1060" /><button class="lightbox-trigger" type="button">
			<svg fill="none" height="12" viewBox="0 0 12 12" width="12" xmlns="http://www.w3.org/2000/svg">
				<path d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" fill="#fff">
			</svg>
		</button><figcaption class="wp-element-caption">Google corrigiu parcialmente a vulnerabilidade (ilustração: Vitor Pádua/Tecnoblog)</figcaption></figure>


<details class="tb-resumo tb-callout padrao">
    Resumo
    <div class="tb-resumo-topicos tb-callout-texto"><ul>
<li>O Pixnapping é um método de ataque em que um malware lê pixels da tela do Android, permitindo a extração de informações como códigos de autenticação e mensagens.</li>
<li>A vulnerabilidade afeta smartphones com Android 13 a 16.</li>
<li>O Google mitigou parcialmente a falha em setembro de 2025 e planeja uma correção adicional em dezembro.</li>
</ul>
</div>
</details>


<p>Uma vulnerabilidade do Android pode abrir caminho para agentes mal-intencionados obterem informações exibidas na tela do sistema. Com isso, informações como códigos de autenticação em
2025-10-14

Pixnapping für Android - und nach nur 30 Sekunden war der Angriff auf den Google-Authenticator erfolgreich - ohne dass User:innen es bemerken!

Pixnapping ist eine neue Art von Angriffen, bei denen eine bösartige Android‑App heimlich Informationen, die von anderen Android‑Apps oder beliebigen Websites angezeigt werden, ausspionieren kann. Pixnapping nutzt Android‑APIs sowie einen hardwarebasierten Seitenkanal aus, der fast alle modernen Android‑Geräte betrifft. Wir haben Pixnapping‑Angriffe auf Google‑ und Samsung‑Handys demonstriert und dabei sensibel­e Daten von Websites wie Gmail und Google‑Konten sowie von Apps wie Signal, Google Authenticator, Venmo und Google Maps vollständig wiederhergestellt.

pixnapping.com/

#android #pixnapping #infosec

2025-10-14

Did you hear? Hackers can now steal your 2FA codes pixel by pixel on Android—even bypassing recent security patches. Your phone's own screen might be revealing more than you think. Find out how this tech twist threatens our security.

thedefendopsdiaries.com/pixnap

#pixnapping
#androidsecurity
#sidechannelattack
#2fa
#cyberthreats

2025-10-14

🔒 Security News Digest - 2025-10-14

📊 17 updates from 5 sources:

🔹 SecurityWeek: Fraud Prevention Firm Resistant AI Raises $25 Million
securityweek.com/fraud-prevent

🔹 Security Boulevard: Unsupported OpenJDK in Financial Systems: Hidden Risks
securityboulevard.com/2025/10/

🔹 Security Boulevard: SSH Proxy, Using a Jumphost
securityboulevard.com/2025/10/

🔹 BleepingComputer: Secure Boot bypass risk threatens nearly 200,000 Linux Framework laptops
bleepingcomputer.com/news/secu

🔹 Security News | TechCrunch: Satellites found exposing unencrypted data, including phone calls and some military comms
techcrunch.com/2025/10/14/sate

🔹 SecurityWeek: SAP Patches Critical Vulnerabilities in NetWeaver, Print Service, SRM
securityweek.com/sap-patches-c

🔹 Security Boulevard: Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report
securityboulevard.com/2025/10/

🔹 BleepingComputer: When AI Agents Join the Teams: The Hidden Security Shifts No One Expects
bleepingcomputer.com/news/secu

🔹 Security Boulevard: 6 Signs Your Point of Sale Systems are Under Attack
securityboulevard.com/2025/10/

🔹 BleepingComputer: Security firms debate CVE credit in overlapping vulnerability reports
bleepingcomputer.com/news/secu

🔹 SecurityWeek: Cybereason Acquired by MSSP Giant LevelBlue
securityweek.com/cybereason-ac

🔹 BleepingComputer: Microsoft warns that Windows 10 reaches end of support today
bleepingcomputer.com/news/micr

🔹 Security Boulevard: #Pixnapping: Android Timing Attack Sends Google Back to the Drawing Board
securityboulevard.com/2025/10/

🔹 The Record from Recorded Future News: Qantas confirms cybercriminals released stolen customer data
therecord.media/qantas-cybercr

🔹 The Record from Recorded Future News: Taiwan reports surge in Chinese cyber activity and disinformation efforts
therecord.media/taiwan-nsb-rep

🔹 SecurityWeek: HyperBunker Raises Seed Funding to Launch Next-Generation Anti-Ransomware Device
securityweek.com/hyperbunker-r

🔹 The Record from Recorded Future News: California enacts age verification, chatbot laws
therecord.media/california-ena

#InfoSec #SecurityNews

Richi Jenningsrichi@vmst.io
2025-10-14

Researchers discover a new way to steal secrets from #Android apps.

Anything any Android app can display is vulnerable to the #Pixnapping attack—including #2FA codes. That’s the worrying claim from a group of researchers this week. “It’s like Rowhammer, but for the screen,” quips one wag.

Google thought it had already fixed the previously undisclosed flaw. But the group’s demo says not. In #SBBlogwatch, we blur the pels.

@TheFuturumGroup @TechstrongGroup @SecurityBlvd: securityboulevard.com/2025/10/

Mr. Curious! :mastodon:CyberHues
2025-10-14

New Attack allows any Android app without permissions to leak info displayed by other apps exploiting Android APIs and a hardware side channel (CVE-2025-48561). Not fixed yet. Effect all Android devices.

PoC: NA

Video demonstrates stealing 2FA codes from Google Authenticator. It's like taking screenshot. Pixnapping exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

Research paper 📜
pixnapping.com/pixnapping.pdf

Ars Technica Newsarstechnica@c.im
2025-10-13

Hackers can steal 2FA codes and private messages from Android phones arstechni.ca/nGsq #sidechannel #pixnapping #Security #android #privacy #Biz&IT #Google

2025-10-13

#Android devices are #vulnerable to a new #attack that can covertly steal #2FA codes, #location timelines, and other private data in less than 30 seconds.

The new attack, named #Pixnapping by the team of academic researchers who devised it, requires a victim to first install a #malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen.
#security #privacy

arstechnica.com/security/2025/

Alan Wangurd00m
2025-10-13

We found a way for any Android app to stealthily leak information displayed by other apps or arbitrary websites (e.g., emails, 2FA codes, and private messages). How is that possible? With !

pixnapping.com

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst