Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Discord Ends Persona Age Verification Trial Amid Privacy Backlash

    February 27, 2026

    OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

    February 27, 2026

    Panasonic Strikes Partnership to Reclaim TV Market Share in the West

    February 26, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI
    • Get In Touch
    Facebook X (Twitter) LinkedIn
    TallwireTallwire
    • Tech

      OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

      February 27, 2026

      Large Hadron Collider Enters Third Shutdown For Major Upgrade

      February 26, 2026

      Stellantis Faces Massive Losses and Strategic Shift After Misjudging EV Market Demand

      February 26, 2026

      AI’s Persistent PDF Parsing Failure Stalls Practical Use

      February 26, 2026

      Solid-State Battery Claims Put to the Test With Record Fast Charging Results

      February 26, 2026
    • AI

      OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

      February 27, 2026

      Anthropic Raises Alarm Over Chinese AI Model Distillation Practices

      February 26, 2026

      AI’s Persistent PDF Parsing Failure Stalls Practical Use

      February 26, 2026

      Tech Firms Push “Friendlier” Robot Designs to Boost Human Acceptance

      February 26, 2026

      Samsung Expands Galaxy AI With Perplexity Integration for Upcoming S26 Series

      February 25, 2026
    • Security

      Discord Ends Persona Age Verification Trial Amid Privacy Backlash

      February 27, 2026

      FBI Issues Alert on Outdated Wi-Fi Routers Vulnerable to Cyber Attacks

      February 25, 2026

      Wikipedia Blacklists Archive.Today After DDoS Abuse And Content Manipulation

      February 24, 2026

      Admissions Website Bug Exposed Children’s Personal Information

      February 23, 2026

      FBI Warns ATM Jackpotting Attacks on the Rise, Costing Hackers Millions in Stolen Cash

      February 22, 2026
    • Health

      Social Media Addiction Trial Draws Grieving Parents Seeking Accountability From Tech Platforms

      February 19, 2026

      Portugal’s Parliament OKs Law to Restrict Children’s Social Media Access With Parental Consent

      February 18, 2026

      Parents Paint 108 Names, Demand Snapchat Reform After Deadly Fentanyl Claims

      February 18, 2026

      UK Kids Turning to AI Chatbots and Acting on Advice at Alarming Rates

      February 16, 2026

      Landmark California Trial Sees YouTube Defend Itself, Rejects ‘Social Media’ and Addiction Claims

      February 16, 2026
    • Science

      Large Hadron Collider Enters Third Shutdown For Major Upgrade

      February 26, 2026

      Google Phases Out Android’s Built-In Weather App, Replacing It With Search-Based Forecasts

      February 25, 2026

      Microsoft’s Breakthrough Suggests Data Could Be Preserved for 10,000 Years on Glass

      February 24, 2026

      NASA Trials Autonomous, AI-Planned Driving on Mars Rover

      February 20, 2026

      XAI Publicly Unveils Elon Musk’s Interplanetary AI Vision In Rare All-Hands Release

      February 14, 2026
    • Tech

      Zuckerberg Testifies In Landmark Trial Over Alleged Teen Social Media Harms

      February 23, 2026

      Gay Tech Networks Under Spotlight In Silicon Valley Culture Debate

      February 23, 2026

      Google Co-Founder’s Epstein Contacts Reignite Scrutiny of Elite Tech Circles

      February 7, 2026

      Bill Gates Denies “Absolutely Absurd” Claims in Newly Released Epstein Files

      February 6, 2026

      Informant Claims Epstein Employed Personal Hacker With Zero-Day Skills

      February 5, 2026
    TallwireTallwire
    Home»Tech»Android Under Siege — New “Pixnapping” Flaw Still Unfixed, Leaks 2FA Codes
    Tech

    Android Under Siege — New “Pixnapping” Flaw Still Unfixed, Leaks 2FA Codes

    Updated:December 25, 20254 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Android Under Siege — New “Pixnapping” Flaw Still Unfixed, Leaks 2FA Codes
    Android Under Siege — New “Pixnapping” Flaw Still Unfixed, Leaks 2FA Codes
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Security researchers have uncovered a resurgent side-channel attack called Pixnapping that lets a malicious Android app read screen pixel data from other apps and thereby steal sensitive information such as two-factor authentication (2FA) codes and private messages. The vulnerability, tracked as CVE-2025-48561, works by exploiting GPU timing and Android’s blur/overlay APIs, allowing attackers to deduce whether a pixel is “non-white” (i.e. part of displayed characters) via rendering time differences. The attack has been successfully demonstrated on multiple devices (Pixel 6 through Pixel 9 and Samsung Galaxy S25) using Android versions 13 to 16, and doesn’t require any special permissions in the app manifest. Although Google issued a partial patch in the September Android security bulletin, researchers say a full mitigation is not yet in place and they discovered a bypass to Google’s limitations. Google plans further fixes in a December security update, but as of now the threat remains active. Beyond Pixnapping, other real-world examples of MFA bypasses and vulnerabilities show that 2FA is increasingly under attack: Russian hackers bypassed Gmail’s MFA via manipulated “app passwords” in social engineering campaigns; and over 100,000 Android malware samples have been found to steal one-time SMS codes.

    Sources: MalwareBytes, ARS Technica

    Key Takeaways

    – Pixnapping revives a decade-old pixel-stealing technique, repackaged for modern Android and GPU hardware, enabling attackers to extract 2FA codes without needing elevated permissions.

    – Partial patches exist, but they’re insufficient — the full fix is still pending, and Google has yet to completely close the side channel.

    – The broader landscape shows that no 2FA method is immune: SMS, authenticator apps, and even app passwords have been targeted via malware or social engineering.

    In-Depth

    The discovery of Pixnapping is a sobering reminder: even technologies we assume are secure—like 2FA—are not beyond reach. The technique revives an old trick: leaking pixel data via timing side channels. But now it’s adapted to Android’s GPU and rendering pipelines, turning what was once a theoretical browser attack into a practical app-level exploit.

    Here’s how Pixnapping works: a malicious app launches a victim app (say Google Authenticator), overlays a semi-transparent window using Android’s blur API, and injects rendering operations whose time depends on whether a given pixel is part of a character or blank background. Because GPUs (and compressed memory paths) behave differently depending on the data, the attacker can infer whether a pixel was “white” or not. Repeating this across pixels allows them to reconstruct the displayed content (i.e. the 2FA code). What makes this especially dangerous is that it doesn’t require any special Android permissions—the attack rides through standard system APIs. The researchers demonstrated successful code extraction at a rate of about 0.6 to 2.1 pixels per second—slow, but enough given short codes. They tested it on multiple Android devices including Pixel 6/7/8/9 and Galaxy S25, across Android 13 to 16.

    Google responded by limiting how many blur API calls an activity can make, but the team found a workaround that still bypasses that restriction. They assert that the most robust defense is to block any attacker from computing on victim pixels in the first place. Google has promised further patches in December, but until those arrive, users are exposed.

    Even beyond Pixnapping, the broader multi-factor landscape is under attack. In June 2025, researchers reported that Russian actors succeeded in bypassing Gmail’s MFA by tricking targets into generating “app passwords” (which skip the second factor) through social engineering campaigns. Meanwhile, mobile malware campaigns continue to proliferate: over 100,000 Android apps have been found that intercept SMS one-time codes, and variants like Cerberus have long been able to steal codes from authenticator apps by abusing accessibility or screen overlays.

    So what’s the path forward? First, it’s critical to recognize that not all forms of 2FA are equal. Hardware security keys or WebAuthn-based MFA are much more resistant to side-channel or overlay attacks. Second, update your device promptly when patches arrive—especially when Google pushes the December update. Third, scrub your installed apps, avoid granting unnecessary permissions (especially for apps hosting dynamic UI overlays or blur effects), and prefer apps from trusted sources only. And lastly, adopt a defense-in-depth mindset: don’t rely solely on 2FA—monitor account access logs, use device binding, and assume that any given security measure might be circumvented.

    In short, Pixnapping is a clever escalation in the arms race: it doesn’t rely on a software bug in the victim app, but exploits the hardware rendering pipeline itself. Until full mitigations are rolled out, every Android user should assume 2FA codes may be at risk, and move their security posture further forward rather than assuming 2FA is foolproof.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAndroid Set to Add System-Wide Blur Toggle; A Response to Readability Concerns
    Next Article Anguilla Reaps $39 Million from .ai Domain Boom in 2024

    Related Posts

    OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

    February 27, 2026

    Large Hadron Collider Enters Third Shutdown For Major Upgrade

    February 26, 2026

    Stellantis Faces Massive Losses and Strategic Shift After Misjudging EV Market Demand

    February 26, 2026

    AI’s Persistent PDF Parsing Failure Stalls Practical Use

    February 26, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    OpenAI’s Stargate Data Center Ambitions Hit Major Roadblocks

    February 27, 2026

    Large Hadron Collider Enters Third Shutdown For Major Upgrade

    February 26, 2026

    Stellantis Faces Massive Losses and Strategic Shift After Misjudging EV Market Demand

    February 26, 2026

    AI’s Persistent PDF Parsing Failure Stalls Practical Use

    February 26, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) LinkedIn Threads Instagram RSS
    • Tech
    • Entertainment
    • Business
    • Government
    • Academia
    • Transportation
    • Legal
    • Press Kit
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.