Worried About 2FA Codes? Pixnapping on Android Might Steal Them

Just a heads up, if you buy something through our links, we may get a small share of the sale. It’s one of the ways we keep the lights on here. Click here for more.

Emerging Threat: Pixnapping on Android Devices

In a striking revelation, an academic team has introduced a novel cybersecurity threat dubbed “Pixnapping,” which poses a significant risk to Android users. This sophisticated attack can swiftly capture sensitive information displayed on a user’s screen—such as two-factor authentication codes, chat messages, and location data—in less than 30 seconds.

The mechanics of Pixnapping are both clever and alarming. It begins with a seemingly innocuous app that requires no special permissions. This app subtly prompts a target application to display confidential content, subsequently probing the phone’s rendering pipeline pixel by pixel to determine whether each pixel is illuminated. By aggregating these “is it on?” responses, the attacker can reconstruct numbers and letters without ever needing to take a traditional screenshot.

The researchers successfully demonstrated this technique on Google Pixel devices and Samsung’s Galaxy S25, suggesting that it could potentially be adapted for other smartphone models. The method exploits a timing side channel, reminiscent of earlier GPU-related vulnerabilities, where minute timing discrepancies in graphics rendering can reveal how long it takes to draw specific visuals.

To execute the attack, the rogue app follows a three-step process:

  1. It triggers the victim app to render sensitive information, such as a Google Authenticator code.
  2. It overlays graphics on top of the content and targets specific pixels with graphic operations.
  3. It measures the delays in rendering and compiles the data into readable characters.

While the process may seem intricate, it is crucial to note that timing is critical, especially since 2FA codes typically expire within 30 seconds. The research team reported varying success rates across different devices, with Pixel phones often yielding results in under the allotted time, while the Galaxy S25 produced less reliable outcomes.

In response to these findings, Google has issued a patch (CVE-2025-48561) in September and is working on additional fixes. Fortunately, the company has not yet observed any real-world exploitation of this vulnerability.

Pixnapping serves as a compelling reminder that what appears on our screens may not be as private as we assume. It highlights the need for users to exercise caution when downloading unknown applications and prompts developers to consider implementing stricter rendering isolation and timing mitigations at the platform level.

As the digital landscape continues to evolve, the importance of safeguarding sensitive information remains paramount. Treating pixels as secrets rather than mere visual elements could be a prudent approach in this increasingly complex environment.

AppWizard
Worried About 2FA Codes? Pixnapping on Android Might Steal Them