Security : ‘Pixnapping’ Attack Puts Android Users’ 2FA Codes at Risk

Cybersecurity researchers have uncovered a new Android vulnerability dubbed “Pixnapping” that allows malicious apps to secretly capture sensitive content from users’ screens — including two-factor authentication (2FA) codes, private chats, and financial data — without needing special permissions or showing any warning signs.

How the Attack Works

The technique, developed by a research team at Carnegie Mellon University, exploits both Android’s system APIs and a side-channel flaw tied to GPU compression, referred to as GPU.zip. This allows a rogue application to extract screen pixels rendered by other apps — effectively “snapping” data straight off the display.

In controlled tests, the team demonstrated that a 2FA code from Google Authenticator could be exfiltrated in under 30 seconds. The attack works silently in the background, without requiring screen capture permissions or alerting the user.

Who Is Affected?

The vulnerability impacts a range of modern Android devices running versions 13 through 16, including popular models such as the Google Pixel 6 to 9 series and the latest Samsung Galaxy S25. The flaw has been formally logged as CVE-2025-48561.

According to lead researcher Riccardo Paccagnella, the exploit undermines the foundational security assumptions of the Android platform. “It’s a fundamental violation of the isolation that Android users rely on,” he stated.

Has Google Responded?

Google has acknowledged the issue and released partial mitigations, but researchers warn that full protection is still pending. Until then, Android remains susceptible to this style of attack, especially if malicious apps manage to gain a foothold on the device.

What Can Users and Businesses Do?

Security professionals advise the following steps:

  • Stay Updated: Always keep your device firmware and apps up to date with the latest security patches.
  • Limit Sensitive On-Screen Content: Avoid displaying authentication codes, private messages, or financial information unless necessary.
  • Vet Your Apps: Only install software from trusted sources such as the Google Play Store, and review app permissions carefully.

While Google continues to work on a comprehensive fix, staying vigilant and reducing unnecessary exposure of critical on-screen data remains key to avoiding exploitation.

The Bigger Picture

Pixnapping highlights a growing class of threats that don’t rely on traditional malware tactics like phishing or system-level exploits, but instead find clever ways to circumvent sandboxing and permission boundaries. As mobile devices increasingly become hubs for personal and professional tasks, the stakes of such vulnerabilities only grow.

Until a full patch is rolled out, Android users—especially those using authentication apps or handling sensitive information—should treat on-screen content as a potential target and adopt extra caution.