Android devices vulnerable to new ‘Pixnapping’ attack: Here’s all you need to know | Technology News


Security researchers say they have devised a new technique to extract private data from apps installed on Android devices, including two-factor authentication (2FA) codes and location timelines, in under a minute.

Known as Pixnapping, the new hacking technique was used to successfully extract data from Google Pixel phones and the Samsung Galaxy S25. It can further be modified to target other devices running Android, as per the researchers from University of California; University of Washington; and Carnegie Mellon University. The findings are detailed in a research paper titled ‘Pixnapping: Bringing Pixel Stealing out of the Stone Age’ published on Monday, October 13.

“Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping. Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible,” the researchers wrote in a separate blog post.

Story continues below this ad

“If an app has secret information that is not visible (eg, it has a secret key that is stored but never shown on the screen), that information cannot be stolen by Pixnapping,” they added. The Pixnapping paper not only contributes to the understanding of such attacks but also exposes the cracks in Google’s security and privacy safeguards, demonstrating that a malicious app might still be able to access another app’s sensitive data.

In response to the findings, Google said that it released updates to patch the vulnerability. “We issued a patch for CVE-2025-48561 in the September Android security bulletin, which partially mitigates this behavior. We are issuing an additional patch for this vulnerability in the December Android security bulletin. We have not seen any evidence of in-the-wild exploitation,” a Google spokesperson was quoted as saying by ArsTechnica.

However, the researchers said that a modified version of the Pixnapping attack still works even after the update has been installed.

How it works

First, the victim has to install a malicious app on an Android phone or tablet. The malicious app will use Android APIs to make calls to the app that the attacker wants to snoop on. These calls can also be used to effectively scan an infected device for apps of interest that have been installed.

Story continues below this ad

The API calls cause the targeted app to display specific data it has access to, such as a message thread in a messaging app or a 2FA code for a specific site. This information is then sent to the Android rendering pipeline, the system that takes each app’s pixels so they can be rendered on the screen.

In the next step, the hackers perform graphical operations on the individual pixels sent by the targeted app to the Android rendering pipeline. Then, they map the coordinates of the target pixels to letters, numbers, or shapes.

“Suppose, for example, (the attacker) wants to steal a pixel that is part of the screen region where a 2FA character is known to be rendered by Google Authenticator,” Alan Linghao Wang, lead author of the research paper, said.

“This pixel is either white (if nothing was rendered there) or non-white (if part of a 2FA digit was rendered there). Then, conceptually, the attacker wants to cause some graphical operations whose rendering time is long if the target victim pixel is non-white and short if it is white. The malicious app does this by opening some malicious activities (i.e., windows) in front of the victim app that was opened in Step 1,” Wang was quoted as saying.

Story continues below this ad

By measuring the amount of time required at each coordinate and comparing them, the attackers can rebuild the images sent to the rendering pipeline one pixel at a time, as per the research paper. “Conceptually, it is as if the malicious app was taking a screenshot of screen contents it should not have access to,” Wang further said.

The Pixnapping technique is reportedly similar to another type of attack called GPU.zip that was uncovered in 2023. It involves exploiting side channels found in GPUs from major suppliers.




Related Posts

Eating full-fat cheese may be linked to reduced dementia risk: Study | Technology News

3 min readFeb 5, 2026 09:22 PM IST A major study that tracked thousands of adults in Sweden for over two decades has discovered a surprising link between the consumption…

Qualcomm, Arm bear brunt of memory shortage as smartphone chip sales disappoint | Technology News

3 min readFeb 5, 2026 09:47 AM IST Memory shortages will constrain sales of cell phones for some time, hurting demand for chip industry companies like supplier Qualcomm and chip…

Leave a Reply

Your email address will not be published. Required fields are marked *

You Missed

RBI MPC Meet 2026 LIVE: RBI Governor Sanjay Malhotra-led MPC to announce repo rate decision today

  • By admin
  • February 6, 2026
  • 0 views
RBI MPC Meet 2026 LIVE: RBI Governor Sanjay Malhotra-led MPC to announce repo rate decision today

White House launches direct to consumer drug site

  • By admin
  • February 6, 2026
  • 0 views
White House launches direct to consumer drug site

Pair of flubbed chips leave Scottie Scheffler in danger of missing the cut at Phoenix Open

  • By admin
  • February 6, 2026
  • 0 views
Pair of flubbed chips leave Scottie Scheffler in danger of missing the cut at Phoenix Open

Smriti Mandhana leads RCB to second WPL title in successful chase

  • By admin
  • February 6, 2026
  • 3 views
Smriti Mandhana leads RCB to second WPL title in successful chase

Gastroenterologist shares benefits and recipe for orange ginger shot: functional drink with orange, ginger, carrot

  • By admin
  • February 6, 2026
  • 5 views
Gastroenterologist shares benefits and recipe for orange ginger shot: functional drink with orange, ginger, carrot

Davis Cup: Jack Draper beats Viktor Durasovic to give Great Britain lead over Norway in qualifying

  • By admin
  • February 6, 2026
  • 3 views
Davis Cup: Jack Draper beats Viktor Durasovic to give Great Britain lead over Norway in qualifying