Tech News

New Attacks ‘PixininaPling’ Allows Promumers to steal Android conversations, 2:00 codes in seconds

Cybercurity investigators have found a new type of attack that affects Android devices, and allows famous hijackers to get their hands into your private texts in the story of seconds.

This includes your private conversations, messages, emails, and verification of two objects (2FA) codes, as the ARS Technica reportedly reports.

Attacks, so-called “Height” by the Group of Investigators, can be used to release information from any data shown on the screen. First, the victim should download the malicious app. When the app is installed, the Pixning of PixningLing is probably without the victim providing permissions for the additional device.

“Whatever the target app is opened with a dangerous app using Pixnicling,” Reads the Pixnaling website, the app done by investigators to share information about attacks. “Messages saying” Chat, 2FA codes, email messages, etc. They are all at risk since they appear. “

According to the Pixning website, the risk is defined in a new research paper, partnership between the University of California, University of California, San Diego, and Carnegie Mellon University. Paperint Presprent, “PixnaPling: To bring a pixel to steal in stones,” is available online and will be published this week at the Taiwan.

Bright light speed

Details that can be displayed on the Android device screen, such as a banned keyword using asterisks, you cannot be stolen by hackers in the pixnipange attack. This is because of the way attacks done.

When the victim includes a dangerous app, supporting Android API to direct other apps by accessing sensitive data. The app and access the pixels displayed on the screen using unintended data leaks, known as a separate net channel. The malicious app optimizes those specific pipelines by the pipeline that gives, when the Pixnish attack have performed graphical activities. This continues until the optical recognition of Optical, or OCR, may, occur, which means the app can issue text from visual.

In fact, any information shown on your device screen can be shared.

“Mindly, it’s as if the malicious app took a screenshot of screen content I should not be able to access,” Pixnipopping site reads.

Investigators checked the Pixnololing attack on Google Pixel 6 to 9 smartphones, and SAMSUNG Galaxy S25, using many different types of Android mobile app, from 13 to 16.

While this certainly agree on matters, researchers say they do not know any of the actual properties of exploitation.

A group of cyberercere investigators notify the Google of the Android risk in February. Google issued its first pixning patch last month. However, researchers get work in days, and let them know Google again. Google says it will happen relieve Finding pixning puppet in Pixetini’s Security Android Security Bulletin.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button