Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Velotric Discover 2 Electric Bike Review: Versatile and Powerful

    December 13, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 13 #446

    December 13, 2025

    27 of the Best Secret Santa Gifts Under $25 for Co-Workers, Friends and Family

    December 13, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Velotric Discover 2 Electric Bike Review: Versatile and Powerful
    • Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 13 #446
    • 27 of the Best Secret Santa Gifts Under $25 for Co-Workers, Friends and Family
    • Apple releases iOS 26.2 and iPadOS 26.2, here’s what’s new
    • We found 70 stocking stuffers under $100 that are actually useful
    • Insignia 43-inch F50 4K Fire TV drops to $99.99 with $100 off
    • Google’s best Gemini AI feature could soon appear in your everyday apps
    • Evolved Novelties Pleasure Puff Inflatable Rabbit Review: A-Spot Stimulation
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»How-To»Pixnapping attack can steal 2FA codes from Android devices using onscreen pixels
    How-To

    Pixnapping attack can steal 2FA codes from Android devices using onscreen pixels

    techupdateadminBy techupdateadminOctober 14, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Pixnapping attack can steal 2FA codes from Android devices using onscreen pixels
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A team of academics says it has found a way to rip sensitive onscreen data from Android devices pixel-by-pixel — fast enough to snatch time-based two-factor authentication (2FA) codes in under 30 seconds. The technique, dubbed Pixnapping and reported on by The Hacker News, apparently targets Google and Samsung phones tested on Android 13 through 16, but the authors argue the necessary ingredients exist across the broader Android ecosystem.

    How the screen-spying flaw theoretically works

    And what it means for users

    Credit: Lucas Gouveia/Android Police | Stanislav Photographer/Shutterstock

    Pixnapping isn’t another screenshot permission abuse. It’s a side-channel pipeline that abuses how Android layers and processes windows. A malicious app (even with all special permissions disabled) can force “victim” app content into the rendering path via intents, then stack semi-transparent activities and trigger visual effects to leak information about each pixel’s value. Repeat that loop, and you can reconstruct whatever’s on screen, including digits in Google Authenticator, bits of a Google Maps Timeline, or other sensitive UI elements.

    That flow isn’t new; it actually builds on GPU.zip, a 2023 disclosure showing that GPU compression behavior can be used for cross-origin pixel theft in browsers. Here, researchers combine that hardware quirk with Android’s window blur API to measure pixel-dependent timing differences and exfiltrate data from non-browser apps. In short: no screenshots, just physics and clever scheduling.

    Google has assigned the issue CVE-2025-48561 (CVSS 5.5) and shipped mitigations in the September 2025 Android Security Bulletin, warning that spammy blur requests can both indicate and enable pixel stealing. However, the researchers say there’s already a workaround that re-enables Pixnapping, and Google is working on another fix.

    There’s a second headache, too. As a side effect of the technique, an attacker can infer whether an arbitrary app is installed, effectively bypassing Android 11’s restrictions on querying the full app list. Google has reportedly marked that behavior “won’t fix.”

    So, what can you do right now? For starters, ensure Play Protect is active, and avoid sideloading sketchy-looking APKs. Overall, be skeptical of apps that insist you open other apps through them, especially if they show odd translucent overlays or blur-heavy transitions.

    On the platform side, the researchers recommend letting sensitive apps opt out of compositing tricks and throttling the attacker’s ability to take high-fidelity timing measurements, to make sure these potential attacks remain theoretical. In the meantime, until patches land everywhere, treat unknown apps like they’re standing over your shoulder with a magnifying glass.

    2FA Android attack Codes Devices OnScreen Pixels Pixnapping Steal
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThis Lenovo Legion Laptop Is Built for Gamers and Students — and It’s $301 Off Right Now
    Next Article I Tweaked My Windows Handheld to Play Battlefield 6. Here Are the Best Settings
    techupdateadmin
    • Website

    Related Posts

    Mobile

    Running Android apps on your Windows 11 PC is about to feel slightly better

    December 12, 2025
    Mobile

    Ayaneo’s first Android phone looks like a return of the Xperia Play

    December 12, 2025
    Mobile

    Android users can now share a live video on 911 calls

    December 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    These 2 Cities Are Pushing Back on Data Centers. Here’s What They’re Worried About

    September 13, 202542 Views

    NYT Strands hints and answers for Monday, August 11 (game #526)

    August 11, 202542 Views

    Today’s NYT Connections: Sports Edition Hints, Answers for Sept. 4 #346

    September 4, 202539 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    Velotric Discover 2 Electric Bike Review: Versatile and Powerful

    December 13, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 13 #446

    December 13, 2025

    27 of the Best Secret Santa Gifts Under $25 for Co-Workers, Friends and Family

    December 13, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2025 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.