• EndlessNightmare@reddthat.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 hour ago

    Even if this particular attack is against Android phones, it should be noted that iPhones have their own security issues.

    Stay safe out there, regardless of what type of phone you use.

  • tidderuuf@lemmy.world
    link
    fedilink
    English
    arrow-up
    47
    arrow-down
    4
    ·
    4 hours ago

    requires a victim to first install a malicious app

    Let me stop you right there… and leave.

    • NaibofTabr@infosec.pub
      link
      fedilink
      English
      arrow-up
      31
      arrow-down
      1
      ·
      4 hours ago

      Normally I would agree with this perspective, but in this case the “malicious app” is just a demo. It requires no permissions to do the malicious behavior, which means that the relevant code could be included in any app and wouldn’t trigger a user approval, a permissions request or a security alert. This could be hiding in anything that you install.

  • socphoenix@midwest.social
    link
    fedilink
    English
    arrow-up
    27
    ·
    6 hours ago

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

  • mfed1122@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    24
    ·
    5 hours ago

    "Our end-to-end attacks simply measure the rendering time per frame of the graphical operations… to determine whether the pixel was white or non-white.”

    This is a prime example of something that is so simple, yet elegant, and brilliant. Fantastically cool and scary.

  • socphoenix@midwest.social
    link
    fedilink
    English
    arrow-up
    1
    ·
    6 hours ago

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

  • solrize@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    5 hours ago

    Gotta wonder why random apps don’t need special permissions to run and operate other apps. You can cause plenty of trouble maliciously navigating a browser even if you can’t see the screen.