• tidderuuf@lemmy.world
    link
    fedilink
    English
    arrow-up
    154
    arrow-down
    10
    ·
    2 months ago

    requires a victim to first install a malicious app

    Let me stop you right there… and leave.

    • NaibofTabr@infosec.pub
      link
      fedilink
      English
      arrow-up
      101
      arrow-down
      3
      ·
      2 months ago

      Normally I would agree with this perspective, but in this case the “malicious app” is just a demo. It requires no permissions to do the malicious behavior, which means that the relevant code could be included in any app and wouldn’t trigger a user approval, a permissions request or a security alert. This could be hiding in anything that you install.

      • krooklochurm@lemmy.ca
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        1
        ·
        2 months ago

        Man in the middle an app download or find some kind of exploit to inject the code from a website, ta da.

        I mean, obviously there’s more to it than this but.

        That’s how these things work. They’re chained.

        • NaibofTabr@infosec.pub
          link
          fedilink
          English
          arrow-up
          2
          ·
          2 months ago

          Hmm, yes that can happen, but can it happen if you’re downloading directly from the Play store?

            • NaibofTabr@infosec.pub
              link
              fedilink
              English
              arrow-up
              2
              ·
              2 months ago

              I’m sure there are apps that have malware built in yes, but I mean the MITM approach during an app download that you were describing.

          • reksas@sopuli.xyz
            link
            fedilink
            English
            arrow-up
            4
            ·
            2 months ago

            first you download something and it has nothing malicious, then you update it later and then it has something.

      • NihilsineNefas@slrpnk.net
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        2 months ago

        So they’re using the same programs that the three letter agencies of the world have been using to crack phones since before touchscreens existed?

        • NaibofTabr@infosec.pub
          link
          fedilink
          English
          arrow-up
          4
          ·
          2 months ago

          This article doesn’t really address that. I don’t think there’s any indication that this particular vulnerability is related to nation-state hacking.

      • FreedomAdvocate@lemmy.net.auBanned from community
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        2 months ago

        So it could be hiding in, what would you call them…….malicious apps?

        The relevant code isn’t going to be in a non malicious app.

        • ReginaPhalange@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          2 months ago

          Listen Mr Zuckerberg, we can improve our ad revenue immensely if we can do this one little trick to Facebook’s code…

          • FreedomAdvocate@lemmy.net.auBanned from community
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 months ago

            Because if it’s doing this it’s a malicious app….

            Google also said they’ve found zero apps doing this.

            • NaibofTabr@infosec.pub
              link
              fedilink
              English
              arrow-up
              3
              ·
              2 months ago

              Because if it’s doing this it’s a malicious app….

              OK, how would you know?

              Google also said they’ve found zero apps doing this.

              So what? There are millions of apps on the Play store, they aren’t all being reviewed with this level of scrutiny. This means basically nothing.

  • mfed1122@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    50
    ·
    2 months ago

    "Our end-to-end attacks simply measure the rendering time per frame of the graphical operations… to determine whether the pixel was white or non-white.”

    This is a prime example of something that is so simple, yet elegant, and brilliant. Fantastically cool and scary.

  • socphoenix@midwest.social
    link
    fedilink
    English
    arrow-up
    42
    ·
    2 months ago

    The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

  • majster@lemmy.zip
    link
    fedilink
    English
    arrow-up
    33
    arrow-down
    2
    ·
    2 months ago

    Never ending side channel attacks. Stallman was right, only 100% FOSS gives you control over your device.

    And given that a lot of this stuff is relying on timing the only reliable cure is to make everything slow. But no one wants that. Or maybe getting rid of precise timers in userspace. It would be funny if stopwatch precision was bound to screen refresh rate.

  • Phoenixz@lemmy.ca
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    2
    ·
    2 months ago

    This is a very big hypothetical.

    They’d need to already have access to your account credentials (email, password or at least something that is regarded the same) then have you install this malicious app, then you’d need this app to be open at the same time as your 2FA app

    It’s possible, yes, it’s an awesome find, yes, and this should be patches, yes yes yes, a thousand yes

    Having said that, I’m not too worried about the potential impact of this, it’ll be fine.

  • solrize@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    2 months ago

    Gotta wonder why random apps don’t need special permissions to run and operate other apps. You can cause plenty of trouble maliciously navigating a browser even if you can’t see the screen.

  • BetaDoggo_@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    8
    ·
    2 months ago

    It has to be tailored to the specific hardware so I don’t think it’s a major concern for most users. It doesn’t seem like something that can be fully mitigated either, so it’s probably not worth worrying about. Side channel attacks are really cool but also kind of useless in most practical scenarios.