Android Phones Susceptible to ‘Pixnapping’ Attack That Steals 2FA Codes, Messages and More, Researchers Say

Researchers demonstrated Pixapping attacks on high-end smartphones such as the Google Pixel 10 and the Samsung Galaxy S25 Ultra.

Advertisement
Written by Shaurya Tomer, Edited by David Delima | Updated: 14 October 2025 16:34 IST
Highlights
  • The attack can exploit Android APIs and a hardware side channel
  • It does not need any system permissions to work, as per researchers
  • Google issued a partial patch in the September security bulletin

The vulnerability is claimed to affect all modern Android handsets

Photo Credit: Unsplash/ Daniel Romero

Android devices are susceptible to a new type of attack that can acquire two-factor authentication (2FA) codes, private messages, location timelines, and other personal information. Security researchers have devised a new attack that demonstrates the vulnerability, dubbed Pixnapping, It can exploit loopholes and security flaws in Google's Android operating system, without requiring any system permissions. As per a report, the malicious application can convert mapped pixel coordinates into alphanumeric characters or geometric shapes by exploiting a side channel.

What is a Pixnapping Attack?

A team of researchers from UC Berkeley, UC San Diego, Carnegie Mellon, and the University of Washington discovered the security flaw, which they call Pixnapping. It allows a malicious app to secretly leak information that is displayed by arbitrary websites or Android apps. The attack relies on Android APIs and a hardware side channel, which is claimed to affect all modern Android handsets. The vulnerability can be tracked under CVE-2025-48561 in the Common Vulnerabilities and Exposures (CVE) system.

Advertisement

The researchers demonstrated Pixapping attacks on high-end smartphones such as the Google Pixel 10 and the Samsung Galaxy S25 Ultra, where they recovered end-to-end protected sensitive data from Gmail and Google accounts using the attack.

Apart from this, it can also recover data from other apps such as Google Authenticator, Google Maps, Signal, and Venmo. In the case of Google Authenticator, specifically, Pixnapping can allow any malicious app to steal 2FA codes in under 30 seconds, while staying hidden from the user.

Advertisement

“Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” researchers told ArsTechnica in a statement.

How the Pixnapping Attack Is Performed

The researchers revealed a three-step approach to using Pixnapping on an Android smartphone.

Advertisement

Step 1: The malicious app calls on Android APIs that make contact with the app that is supposed to be snooped on. As per researchers, these calls can also be used to scan an infected device for installed apps or cause the targeted app to display specific data it has access to.

For example, it can reportedly force an app to display a message thread in a messaging app or find a 2FA code from a specific website. The report states that when an app is called upon, it sends information to the Android rendering pipeline, taking each app's pixels so that they can be rendered on the screen. It can include activities, intents, and tasks, researchers said.

Advertisement

Step 2: The second step of the attack involves performing graphical operations on individual pixels that the targeted app has sent towards the rendering pipeline. As per researchers, the operations can choose the coordinates of the targeted pixels that the app wants to steal.

It then runs a basic but repeated test on the colour of the pixels at those coordinates. Instead of determining the exact colour, the attack involves the use of a simple binary check.

Step 3: The third and final step of the Pixnapping attack is said to measure the amount of time required at each coordinate. The attack can rebuild the images that have been sent to the rendering pipeline one pixel at a time by combining the times for each one of them.

As per the report, the amount of time required to perform the attack varies based on several variables, such as the number of coordinates that need to be measured.

Google says it has partially patched the Android software to prevent Pixnapping. “We issued a patch for CVE-2025-48561 in the September Android security bulletin, which partially mitigates this behaviour,” the company wrote in an email to the publication.

Further, it will also issue an additional patch for this vulnerability with the December Android security bulletin. Researchers say they have discovered a workaround to make Pixnapping work despite the patch. However, Google reportedly said that there is no evidence of it being exploited in the wild.

 
REVIEW
  • Design
  • Display
  • Software
  • Performance
  • Battery Life
  • Camera
  • Value for Money
  • Good
  • Solid and premium design
  • Bright display
  • AI smart features on board
  • Decent primary camera
  • Seven years of software support
  • Bad
  • Limited to a single 256GB storage only
  • Tensor G5 is underwhelming
  • Battery life could have been better
  • Not massive upgrades compared to Pixel 9
 
KEY SPECS
Display 6.30-inch
Front Camera 10.5-megapixel
Rear Camera 48-megapixel + 13-megapixel + 10.8-megapixel
RAM 12GB
Storage 256GB
Battery Capacity 4970mAh
OS Android 16
Resolution 1080x242 pixels
NEWS
REVIEW
  • Design
  • Display
  • Software
  • Performance
  • Battery Life
  • Camera
  • Value for Money
  • Good
  • New design is for the better
  • Cameras deliver consistent performance
  • Good battery life
  • Excellent performance
  • Smooth UI
  • Bad
  • S-Pen is a downgrade
  • No Dolby Vision support
  • Low light camera performance is lacking
  • Slow charging
 
KEY SPECS
Display 6.90-inch
Processor Snapdragon 8 Elite
Front Camera 12-megapixel
Rear Camera 200-megapixel + 50-megapixel + 50-megapixel + 10-megapixel
RAM 12GB, 16GB
Storage 256GB, 512GB, 1TB
Battery Capacity 5000mAh
OS Android 15
Resolution 1400x3120 pixels
NEWS

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Vivo T5 Pro 5G With 9,020mAh Battery Arrives in India at This Price
  2. These Samsung Galaxy S25 Models Just Received a Price Cut in India
  3. Motorola Edge 70 Pro Will Debut in India in Three Colourways on This Date
  4. Oppo F33 Pro 5G Arrives in India With a 7,000mAh Battery at This Price
  5. Redmi A7 Pro 5G Goes on Sale in India: See Price, Features and Offers
  6. OnePlus Pad 3 Pro Might Feature This Flagship Chip From the OnePlus 15
  7. Oppo Find X9s to Launch Globally Alongside Find X9 Ultra: See Design
  8. Xiaomi TV S Mini LED (2026) Series With 4K Display Launched: See Price
  9. God of War Spinoff Will Reportedly Feature Tyr, Explore Several Mythologies
  10. OnePlus Ace 6 Ultra Launch Confirmed; Will Arrive in This Colourway
  1. OnePlus Buds Ace 3 Launch Teased, Might Debut With OnePlus Ace 6 Ultra This Month
  2. Snapdragon 8 Elite Gen 6 Specifications Leaked: Here's How It Differs From the Snapdragon 8 Elite Gen 6 Pro
  3. Meta Partners With Broadcom to Develop Next Generation of Its AI Chipsets
  4. OnePlus Pad 3 Pro Likely to Feature Same Snapdragon Chipset Seen on OnePlus 15, Geekbench Listing Shows
  5. Motorola Edge 70 Pro India Launch Date Announced; Colour Options, Key Features Revealed
  6. Web3 Hacks Cost $482 Million in Q1 2026 as Hackers Lean on Phishing, Social Engineering
  7. God of War Spinoff Game Will Reportedly Feature Tyr, Explore Multiple Mythologies
  8. Xiaomi TV S Mini LED Series (2026) Launched in India With 4K Display, 34W Quad Speaker Unit
  9. Vivo T5 Pro 5G Launched in India With 9,020mAh Battery, 50-Megapixel Rear Camera: Price, Specifications
  10. Samsung Galaxy S25 Ultra, Galaxy S25 FE and Galaxy S25 Get Price Cuts in India
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.