• tidderuuf@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    3 months ago

    requires a victim to first install a malicious app

    Let me stop you right there… and leave.

    • NaibofTabr@infosec.pub
      link
      fedilink
      English
      arrow-up
      6
      ·
      3 months ago

      Normally I would agree with this perspective, but in this case the “malicious app” is just a demo. It requires no permissions to do the malicious behavior, which means that the relevant code could be included in any app and wouldn’t trigger a user approval, a permissions request or a security alert. This could be hiding in anything that you install.

  • mfed1122@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 months ago

    "Our end-to-end attacks simply measure the rendering time per frame of the graphical operations… to determine whether the pixel was white or non-white.”

    This is a prime example of something that is so simple, yet elegant, and brilliant. Fantastically cool and scary.

  • EndlessNightmare@reddthat.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    3 months ago

    Even if this particular attack is against Android phones, it should be noted that iPhones have their own security issues.

    Stay safe out there, regardless of what type of phone you use.

    Edit: lol, looks like I ruffled some feathers, with a few people really going the extra mile to take the wrong message from it

    • Rai@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      Lawl “exploit developed for android phones”

      You: UK AKSHULLY IPHONES AREN’T SECURE THOUGH

      • EndlessNightmare@reddthat.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        3 months ago

        Alternately: I was mentioning this to pre-empt anyone marching in here and puffing up about iPhone. Or thinking that they don’t need to worry about security issues.

        Of course you know and understand the intent of my comment. Your bad-faith response fails to impress.

    • Arcane2077@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      3 months ago

      Permissions, when built-in to the operating system from conception, are much more effective than when they’re half-heartedly tacked on decades later, which is why these issues keep coming up on Android but not on iOS

      • buddascrayon@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        3 months ago

        The difference isn’t actually in the operating system. iOS is just as vulnerable to such things. The difference is in how the app store is run. Apple locks down there app store so that it’s much more difficult to get malicious apps added. Google is extremely less thorough. Which is one of the reason many of us choose Android. When you choose more freedom the price is more vigilance is necessary to secure yourself and your phone.

  • Phoenixz@lemmy.ca
    link
    fedilink
    English
    arrow-up
    2
    ·
    3 months ago

    This is a very big hypothetical.

    They’d need to already have access to your account credentials (email, password or at least something that is regarded the same) then have you install this malicious app, then you’d need this app to be open at the same time as your 2FA app

    It’s possible, yes, it’s an awesome find, yes, and this should be patches, yes yes yes, a thousand yes

    Having said that, I’m not too worried about the potential impact of this, it’ll be fine.

  • socphoenix@midwest.social
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 months ago

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

      • buddascrayon@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        edit-2
        3 months ago

        Yes that’s why you verify the safety and security of the apps you’re installing on your phone and don’t just go, “ooo, this looks cool, let’s download it and try it out”. This is especially true if you are installing FOSS apps.