Android Phones Susceptible to ‘Pixnapping’ Attack That Steals 2FA Codes, Messages and More, Researchers Say

Researchers demonstrated Pixapping attacks on high-end smartphones such as the Google Pixel 10 and the Samsung Galaxy S25 Ultra.

Advertisement
Written by Shaurya Tomer, Edited by David Delima | Updated: 14 October 2025 16:34 IST
Highlights
  • The attack can exploit Android APIs and a hardware side channel
  • It does not need any system permissions to work, as per researchers
  • Google issued a partial patch in the September security bulletin

The vulnerability is claimed to affect all modern Android handsets

Photo Credit: Unsplash/ Daniel Romero

Android devices are susceptible to a new type of attack that can acquire two-factor authentication (2FA) codes, private messages, location timelines, and other personal information. Security researchers have devised a new attack that demonstrates the vulnerability, dubbed Pixnapping, It can exploit loopholes and security flaws in Google's Android operating system, without requiring any system permissions. As per a report, the malicious application can convert mapped pixel coordinates into alphanumeric characters or geometric shapes by exploiting a side channel.

What is a Pixnapping Attack?

A team of researchers from UC Berkeley, UC San Diego, Carnegie Mellon, and the University of Washington discovered the security flaw, which they call Pixnapping. It allows a malicious app to secretly leak information that is displayed by arbitrary websites or Android apps. The attack relies on Android APIs and a hardware side channel, which is claimed to affect all modern Android handsets. The vulnerability can be tracked under CVE-2025-48561 in the Common Vulnerabilities and Exposures (CVE) system.

The researchers demonstrated Pixapping attacks on high-end smartphones such as the Google Pixel 10 and the Samsung Galaxy S25 Ultra, where they recovered end-to-end protected sensitive data from Gmail and Google accounts using the attack.

Advertisement

Apart from this, it can also recover data from other apps such as Google Authenticator, Google Maps, Signal, and Venmo. In the case of Google Authenticator, specifically, Pixnapping can allow any malicious app to steal 2FA codes in under 30 seconds, while staying hidden from the user.

Advertisement

“Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” researchers told ArsTechnica in a statement.

How the Pixnapping Attack Is Performed

The researchers revealed a three-step approach to using Pixnapping on an Android smartphone.

Advertisement

Step 1: The malicious app calls on Android APIs that make contact with the app that is supposed to be snooped on. As per researchers, these calls can also be used to scan an infected device for installed apps or cause the targeted app to display specific data it has access to.

For example, it can reportedly force an app to display a message thread in a messaging app or find a 2FA code from a specific website. The report states that when an app is called upon, it sends information to the Android rendering pipeline, taking each app's pixels so that they can be rendered on the screen. It can include activities, intents, and tasks, researchers said.

Advertisement

Step 2: The second step of the attack involves performing graphical operations on individual pixels that the targeted app has sent towards the rendering pipeline. As per researchers, the operations can choose the coordinates of the targeted pixels that the app wants to steal.

It then runs a basic but repeated test on the colour of the pixels at those coordinates. Instead of determining the exact colour, the attack involves the use of a simple binary check.

Step 3: The third and final step of the Pixnapping attack is said to measure the amount of time required at each coordinate. The attack can rebuild the images that have been sent to the rendering pipeline one pixel at a time by combining the times for each one of them.

As per the report, the amount of time required to perform the attack varies based on several variables, such as the number of coordinates that need to be measured.

Google says it has partially patched the Android software to prevent Pixnapping. “We issued a patch for CVE-2025-48561 in the September Android security bulletin, which partially mitigates this behaviour,” the company wrote in an email to the publication.

Further, it will also issue an additional patch for this vulnerability with the December Android security bulletin. Researchers say they have discovered a workaround to make Pixnapping work despite the patch. However, Google reportedly said that there is no evidence of it being exploited in the wild.

 
REVIEW
  • Design
  • Display
  • Software
  • Performance
  • Battery Life
  • Camera
  • Value for Money
  • Good
  • Solid and premium design
  • Bright display
  • AI smart features on board
  • Decent primary camera
  • Seven years of software support
  • Bad
  • Limited to a single 256GB storage only
  • Tensor G5 is underwhelming
  • Battery life could have been better
  • Not massive upgrades compared to Pixel 9
 
KEY SPECS
Display 6.30-inch
Front Camera 10.5-megapixel
Rear Camera 48-megapixel + 13-megapixel + 10.8-megapixel
RAM 12GB
Storage 256GB
Battery Capacity 4970mAh
OS Android 16
Resolution 1080x242 pixels
NEWS
REVIEW
  • Design
  • Display
  • Software
  • Performance
  • Battery Life
  • Camera
  • Value for Money
  • Good
  • New design is for the better
  • Cameras deliver consistent performance
  • Good battery life
  • Excellent performance
  • Smooth UI
  • Bad
  • S-Pen is a downgrade
  • No Dolby Vision support
  • Low light camera performance is lacking
  • Slow charging
 
KEY SPECS
Display 6.90-inch
Processor Snapdragon 8 Elite
Front Camera 12-megapixel
Rear Camera 200-megapixel + 50-megapixel + 50-megapixel + 10-megapixel
RAM 12GB, 16GB
Storage 256GB, 512GB, 1TB
Battery Capacity 5000mAh
OS Android 15
Resolution 1400x3120 pixels
NEWS

Catch the latest from the Consumer Electronics Show on Gadgets 360, at our CES 2026 hub.

Advertisement

Related Stories

Popular Mobile Brands
  1. These Smartphones Will Be Discounted During Flipkart Republic Day Sale
  2. OnePlus Freedom Sale Slashes Prices of Phones, Tablets, and More Products
  3. Vivo X200T Confirmed to Launch in India Soon: See Expected Specs
  4. Here Are Some of the Best Smartphones With Snapdragon 7 Gen 4 SoC
  5. These OnePlus, Samsung Phones Will Be on Sale During Amazon's Next Sale
  6. ISRO's PSLV Suffers Second Failure as Third-Stage Glitch Sends Rocket Off Course
  7. Best Laser Printers to Buy in India Right Now
  8. Poco M8 5G Review
  1. ISRO’s PSLV Suffers Second Failure as Third-Stage Glitch Sends Rocket Off Course
  2. NASA Confirms First Medical Evacuation in ISS’s 25-Year History
  3. Space Forge Tests World’s First Commercial Semiconductor Factory in Space
  4. 83rd Golden Globe Awards Full List of Winners: Hamnet, The Pitt, Adolescence, and More
  5. Kirkkan OTT Release Date: When and Where to Watch This Gripping Crime Investigation Drama Online?
  6. Mana Shankara Vara Prasad Garu OTT Release Date Reportedly Leaked Online
  7. Forza Horizon 5 Is Said to Have Sold Over 5 Million Copies on PS5
  8. Realme Neo 8 Display Details Teased; TENAA Listing Reveals Key Specifications
  9. iPhone 17 Pro, iPhone 17 Pro Max, iPhone Air Discounts Revealed Ahead of Amazon Great Republic Day Sale 2026
  10. Google’s AI Overviews Giving Incorrect Medical Advice as OpenAI, Anthropic Push for Healthcare: Report
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.