Android Phones Susceptible to ‘Pixnapping’ Attack That Steals 2FA Codes, Messages and More, Researchers Say

Researchers demonstrated Pixapping attacks on high-end smartphones such as the Google Pixel 10 and the Samsung Galaxy S25 Ultra.

Advertisement
Written by Shaurya Tomer, Edited by David Delima | Updated: 14 October 2025 16:34 IST
Highlights
  • The attack can exploit Android APIs and a hardware side channel
  • It does not need any system permissions to work, as per researchers
  • Google issued a partial patch in the September security bulletin

The vulnerability is claimed to affect all modern Android handsets

Photo Credit: Unsplash/ Daniel Romero

Android devices are susceptible to a new type of attack that can acquire two-factor authentication (2FA) codes, private messages, location timelines, and other personal information. Security researchers have devised a new attack that demonstrates the vulnerability, dubbed Pixnapping, It can exploit loopholes and security flaws in Google's Android operating system, without requiring any system permissions. As per a report, the malicious application can convert mapped pixel coordinates into alphanumeric characters or geometric shapes by exploiting a side channel.

What is a Pixnapping Attack?

A team of researchers from UC Berkeley, UC San Diego, Carnegie Mellon, and the University of Washington discovered the security flaw, which they call Pixnapping. It allows a malicious app to secretly leak information that is displayed by arbitrary websites or Android apps. The attack relies on Android APIs and a hardware side channel, which is claimed to affect all modern Android handsets. The vulnerability can be tracked under CVE-2025-48561 in the Common Vulnerabilities and Exposures (CVE) system.

The researchers demonstrated Pixapping attacks on high-end smartphones such as the Google Pixel 10 and the Samsung Galaxy S25 Ultra, where they recovered end-to-end protected sensitive data from Gmail and Google accounts using the attack.

Advertisement

Apart from this, it can also recover data from other apps such as Google Authenticator, Google Maps, Signal, and Venmo. In the case of Google Authenticator, specifically, Pixnapping can allow any malicious app to steal 2FA codes in under 30 seconds, while staying hidden from the user.

Advertisement

“Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” researchers told ArsTechnica in a statement.

How the Pixnapping Attack Is Performed

The researchers revealed a three-step approach to using Pixnapping on an Android smartphone.

Advertisement

Step 1: The malicious app calls on Android APIs that make contact with the app that is supposed to be snooped on. As per researchers, these calls can also be used to scan an infected device for installed apps or cause the targeted app to display specific data it has access to.

For example, it can reportedly force an app to display a message thread in a messaging app or find a 2FA code from a specific website. The report states that when an app is called upon, it sends information to the Android rendering pipeline, taking each app's pixels so that they can be rendered on the screen. It can include activities, intents, and tasks, researchers said.

Advertisement

Step 2: The second step of the attack involves performing graphical operations on individual pixels that the targeted app has sent towards the rendering pipeline. As per researchers, the operations can choose the coordinates of the targeted pixels that the app wants to steal.

It then runs a basic but repeated test on the colour of the pixels at those coordinates. Instead of determining the exact colour, the attack involves the use of a simple binary check.

Step 3: The third and final step of the Pixnapping attack is said to measure the amount of time required at each coordinate. The attack can rebuild the images that have been sent to the rendering pipeline one pixel at a time by combining the times for each one of them.

As per the report, the amount of time required to perform the attack varies based on several variables, such as the number of coordinates that need to be measured.

Google says it has partially patched the Android software to prevent Pixnapping. “We issued a patch for CVE-2025-48561 in the September Android security bulletin, which partially mitigates this behaviour,” the company wrote in an email to the publication.

Further, it will also issue an additional patch for this vulnerability with the December Android security bulletin. Researchers say they have discovered a workaround to make Pixnapping work despite the patch. However, Google reportedly said that there is no evidence of it being exploited in the wild.

 
REVIEW
  • Design
  • Display
  • Software
  • Performance
  • Battery Life
  • Camera
  • Value for Money
  • Good
  • Solid and premium design
  • Bright display
  • AI smart features on board
  • Decent primary camera
  • Seven years of software support
  • Bad
  • Limited to a single 256GB storage only
  • Tensor G5 is underwhelming
  • Battery life could have been better
  • Not massive upgrades compared to Pixel 9
 
KEY SPECS
Display 6.30-inch
Front Camera 10.5-megapixel
Rear Camera 48-megapixel + 13-megapixel + 10.8-megapixel
RAM 12GB
Storage 256GB
Battery Capacity 4970mAh
OS Android 16
Resolution 1080x242 pixels
NEWS
REVIEW
  • Design
  • Display
  • Software
  • Performance
  • Battery Life
  • Camera
  • Value for Money
  • Good
  • New design is for the better
  • Cameras deliver consistent performance
  • Good battery life
  • Excellent performance
  • Smooth UI
  • Bad
  • S-Pen is a downgrade
  • No Dolby Vision support
  • Low light camera performance is lacking
  • Slow charging
 
KEY SPECS
Display 6.90-inch
Processor Snapdragon 8 Elite
Front Camera 12-megapixel
Rear Camera 200-megapixel + 50-megapixel + 50-megapixel + 10-megapixel
RAM 12GB, 16GB
Storage 256GB, 512GB, 1TB
Battery Capacity 5000mAh
OS Android 15
Resolution 1400x3120 pixels
NEWS

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Amazon Black Friday Sale 2025: Best Deals on OnePlus Smartphones
  2. OnePlus 15 Reportedly Bags FCC Certification Hinting at Imminent US Launch
  3. Emily in Paris Season 5: Know When, Where to Watch the Romance Comedy Series
  4. Amazon Black Friday Sale 2025: Here Are the Best Deals on iQOO Smartphones
  1. X-Ray Nebula Discovery Brings Astronomers Closer to Solving Cosmic Ray Mystery
  2. China’s Massive JUNO Experiment Delivers Its First World-Class Neutrino Results
  3. Emily in Paris Season 5 OTT Release: Know When, Where to Watch the Romance Comedy Series
  4. China Tests Humanoid Robots to Guide Travellers at Border Crossing
  5. Raktabeej 2 OTT Release: Know When, Where to Watch the Bengali Political Action Thriller
  6. Ravi Teja-Starrer Mass Jathara Now Streaming on OTT: Know Where to Watch the Film Online
  7. Aaryan Now Streaming on Netflix: Everything You Need to Know About Vishnu Vishal’s Crime Thriller
  8. Realme 16 Pro+ 5G, Realme C81 Storage Variants, Colourways Leaked; Could Launch in India Soon
  9. Sennheiser HDB 630 Wireless Headphones Launched in India With Up to 60 Hours of Battery Life: Price, Features
  10. New Stanford Algorithm Derank Divisive Political Posts on X
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.