‘Pixnapping’ Attack Enables Rapid Theft of Android Chats and 2FA Codes

Spread the love

Key Insights

  • Attack Type: The newly discovered attack on Android devices is called “Pixnapping.”
  • Data Vulnerability: Pixnapping allows hackers to access private information displayed on the screen, including chats and 2FA codes.
  • Malicious Apps: The attack requires victims to download a harmful app, after which it operates without further permissions.
  • Research Collaboration: This vulnerability was detailed by researchers from several prestigious universities, including UC Berkeley and Carnegie Mellon.

Cybersecurity researchers have discovered a new type of attack that affects Android devices, and they say it lets hackers get their hands on your private data in a matter of seconds.

This includes your private chats, text messages, emails, and even two-factor authentication (2FA) codes, as Ars Technica reported.

The attack, dubbed “Pixnapping” by the team of researchers who discovered it, can be used to extract information from any data displayed on the screen. First, the victim has to download a malicious app. Once the app is installed, a Pixnapping attack can occur without the victim providing any further device permissions.

“Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping,” reads a message on the Pixnapping website, a resource created by researchers to share information on the attack. “Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible.”

According to the Pixnapping website, the vulnerability is detailed in a new research paper, part of a collaboration between seven researchers at the University of California, Berkeley, University of Washington, University of California, San Diego, and Carnegie Mellon University. A preprint of the paper, titled “Pixnapping: Bringing Pixel Stealing out of the Stone Age,” is available online and will be published this week at the 32nd ACM Conference on Computer and Communications Security in Taiwan.

Mashable Light Speed

Information that can not be displayed on the Android device’s screen, such as a secret key that is obscured using asterisks for example, cannot be stolen by the hackers in a Pixnapping attack. This is because of the way the attack is carried out.

See also  Access Tokens Stolen from European Space Agency by Hackers

Once a victim installs the malicious app, it weaponizes the Android API to target other apps with access to sensitive data. The app then accesses the pixels displayed on the screen using an unintended data leak, also known as a hardware side channel. The malicious app pushes those individual pixels through the rendering pipeline, where the Pixnapping attack then performs graphical operations. This continues until optical character recognition, or OCR, can occur, meaning the app can extract text from visuals.

In effect, any information that’s displayed on your device’s screen can then be stolen.

“Conceptually, it is as if the malicious app was taking a screenshot of screen contents it should not have access to,” the Pixnapping site reads.

Researchers tested the Pixnapping attack on Google Pixel 6 through 9 smartphones, as well as the Samsung Galaxy S25, running numerous different versions of the Android mobile operating system, from Android 13 to 16.

While this is certainly concerning news, researchers say that they are unaware of any real-world examples of the exploit being used in the wild.

The team of cybersecurity researchers informed Google of the Android vulnerability in February. Google released its first patch for Pixnapping last month. However, the researchers discovered a workaround within days, and informed Google once again. Google says it will release an additional Pixnapping patch in its December Android security bulletin.

Here you can find the original content; the photos and images used in our article also come from this source. We are not their authors; they have been used solely for informational purposes with proper attribution to their original source.

  • David Bridges

    David Bridges

    David Bridges is a media culture writer and social trends observer with over 15 years of experience in analyzing the intersection of entertainment, digital behavior, and public perception. With a background in communication and cultural studies, David blends critical insight with a light, relatable tone that connects with readers interested in celebrities, online narratives, and the ever-evolving world of social media. When he's not tracking internet drama or decoding pop culture signals, David enjoys people-watching in cafés, writing short satire, and pretending to ignore trending hashtags.

    Related Posts

    56% Off 8-in-1 Portable Keyring Deal

    Spread the love

    Spread the love Share It: ChatGPT Perplexity WhatsApp LinkedIn X Grok Google AI Quick Summary: Charge effortlessly while on the move with a remarkable 56% discount on the GoCable 8-in-1 EDC…

    Read more

    Creators of Banned ICE Trackers Win Ruling on First Amendment Rights

    Spread the love

    Spread the love Share It: ChatGPT Perplexity WhatsApp LinkedIn X Grok Google AI A federal judge has issued a preliminary injunction that favors the creators of the “ICE Sightings –…

    Read more

    You Missed

    Prodentim Reviews: Customer Feedback, User Results & Oral Health Benefits

    Prodentim Reviews: Customer Feedback, User Results & Oral Health Benefits

    Coi Leray and Olandria’s Link Up Excites Fans

    Coi Leray and Olandria’s Link Up Excites Fans

    56% Off 8-in-1 Portable Keyring Deal

    56% Off 8-in-1 Portable Keyring Deal

    35,000 People Quit Social Media for Six Weeks: Results Revealed

    35,000 People Quit Social Media for Six Weeks: Results Revealed

    Keep Your Phone Secure: Protect Your Data on the Go

    Keep Your Phone Secure: Protect Your Data on the Go

    Get Refunds for Tickets: A Guide from Hollywood Life

    Get Refunds for Tickets: A Guide from Hollywood Life

    Creators of Banned ICE Trackers Win Ruling on First Amendment Rights

    Creators of Banned ICE Trackers Win Ruling on First Amendment Rights

    Deepika Padukone Announces Second Pregnancy with Ranveer Singh

    Deepika Padukone Announces Second Pregnancy with Ranveer Singh

    Boyfriend’s Hair Cut Off: Teariney Dixon Arrested

    Boyfriend’s Hair Cut Off: Teariney Dixon Arrested

    Street Fighter Movie: Embracing Its True Identity

    Street Fighter Movie: Embracing Its True Identity