New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions
Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data without the users' knowledge pixel-by-pixel. The attack has been codenamed Pixnapping by a group of academics from the University of California (Berkeley), University of
AI Analysis
Technical Summary
Pixnapping is a sophisticated pixel-stealing side-channel attack discovered by academic researchers from multiple US universities, targeting Android devices primarily from Google and Samsung running Android versions 13 through 16. The attack leverages a hardware side-channel vulnerability in integrated GPUs (iGPUs), previously disclosed as GPU.zip, combined with Android's window blur API and intent mechanisms. A malicious app, without requiring any special permissions, can coerce victim app pixels into the rendering pipeline by invoking victim app activities via Android intents. It then overlays a stack of semi-transparent Android activities that apply graphical operations such as blur to these pixels. By measuring the time and color-dependent side effects of these operations, the rogue app can reconstruct the pixel data of sensitive information displayed by the victim app, including 2FA codes from apps like Google Authenticator and location data from Google Maps timelines. This pixel-by-pixel extraction can be completed in under 30 seconds. The attack bypasses browser mitigations and affects non-browser apps, making it particularly dangerous. Google issued patches in the September 2025 Android Security Bulletin addressing the vulnerability (CVE-2025-48561) but acknowledged that certain workarounds can re-enable the exploit. Additionally, the attack enables an unpatched method to enumerate installed apps on the device, circumventing restrictions introduced since Android 11. The attack's feasibility stems from Android's design allowing app layering and inter-app rendering interactions, which complicates straightforward mitigation. The researchers suggest that sensitive apps should be allowed to opt out of such rendering interactions and that measurement capabilities should be restricted to reduce attack viability. Currently, no comprehensive fix is available, and Google is actively working on further mitigations.
Potential Impact
For European organizations, the Pixnapping attack poses a significant risk to mobile security, especially for employees and users relying on Android devices from Google and Samsung for accessing corporate resources protected by 2FA. The theft of 2FA codes undermines multi-factor authentication, a critical security control, potentially enabling unauthorized access to corporate accounts, email, VPNs, and cloud services. The ability to covertly steal location data and app usage information also raises privacy concerns and could facilitate targeted espionage or insider threat activities. Since the attack requires installation of a malicious app, social engineering or supply chain compromises could be vectors for infection. The stealthy nature of the attack, requiring no special permissions, makes detection difficult, increasing the risk of prolonged undetected breaches. The partial patching status and existence of workarounds mean that many devices remain vulnerable, especially if updates are delayed or incomplete. This threat could impact sectors with high security requirements such as finance, government, healthcare, and critical infrastructure across Europe, where Android devices are widely used. The ability to bypass app enumeration restrictions also aids attackers in profiling devices for further exploitation.
Mitigation Recommendations
European organizations should enforce strict mobile device management (MDM) policies to ensure timely installation of Android security updates, particularly the September 2025 security bulletin addressing CVE-2025-48561. They should restrict installation of apps from untrusted sources and implement application allowlisting to prevent rogue apps from being installed. Security awareness training should emphasize risks of installing unknown apps and encourage vigilance against social engineering. Organizations should monitor device behavior for unusual graphical operations or performance anomalies that could indicate side-channel exploitation. Developers of sensitive apps (e.g., authenticators, banking apps) should consider implementing opt-out mechanisms to prevent their app activities from being rendered or blurred by other apps, reducing exposure to pixel stealing. Collaboration with device manufacturers and Google to accelerate patch deployment and address workarounds is critical. Endpoint detection and response (EDR) solutions with mobile capabilities should be tuned to detect suspicious app layering or intent abuse. Finally, organizations should consider multi-factor authentication methods that do not rely solely on on-screen codes, such as hardware tokens or biometric factors, to mitigate the impact of 2FA code theft.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Finland
New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions
Description
Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data without the users' knowledge pixel-by-pixel. The attack has been codenamed Pixnapping by a group of academics from the University of California (Berkeley), University of
AI-Powered Analysis
Technical Analysis
Pixnapping is a sophisticated pixel-stealing side-channel attack discovered by academic researchers from multiple US universities, targeting Android devices primarily from Google and Samsung running Android versions 13 through 16. The attack leverages a hardware side-channel vulnerability in integrated GPUs (iGPUs), previously disclosed as GPU.zip, combined with Android's window blur API and intent mechanisms. A malicious app, without requiring any special permissions, can coerce victim app pixels into the rendering pipeline by invoking victim app activities via Android intents. It then overlays a stack of semi-transparent Android activities that apply graphical operations such as blur to these pixels. By measuring the time and color-dependent side effects of these operations, the rogue app can reconstruct the pixel data of sensitive information displayed by the victim app, including 2FA codes from apps like Google Authenticator and location data from Google Maps timelines. This pixel-by-pixel extraction can be completed in under 30 seconds. The attack bypasses browser mitigations and affects non-browser apps, making it particularly dangerous. Google issued patches in the September 2025 Android Security Bulletin addressing the vulnerability (CVE-2025-48561) but acknowledged that certain workarounds can re-enable the exploit. Additionally, the attack enables an unpatched method to enumerate installed apps on the device, circumventing restrictions introduced since Android 11. The attack's feasibility stems from Android's design allowing app layering and inter-app rendering interactions, which complicates straightforward mitigation. The researchers suggest that sensitive apps should be allowed to opt out of such rendering interactions and that measurement capabilities should be restricted to reduce attack viability. Currently, no comprehensive fix is available, and Google is actively working on further mitigations.
Potential Impact
For European organizations, the Pixnapping attack poses a significant risk to mobile security, especially for employees and users relying on Android devices from Google and Samsung for accessing corporate resources protected by 2FA. The theft of 2FA codes undermines multi-factor authentication, a critical security control, potentially enabling unauthorized access to corporate accounts, email, VPNs, and cloud services. The ability to covertly steal location data and app usage information also raises privacy concerns and could facilitate targeted espionage or insider threat activities. Since the attack requires installation of a malicious app, social engineering or supply chain compromises could be vectors for infection. The stealthy nature of the attack, requiring no special permissions, makes detection difficult, increasing the risk of prolonged undetected breaches. The partial patching status and existence of workarounds mean that many devices remain vulnerable, especially if updates are delayed or incomplete. This threat could impact sectors with high security requirements such as finance, government, healthcare, and critical infrastructure across Europe, where Android devices are widely used. The ability to bypass app enumeration restrictions also aids attackers in profiling devices for further exploitation.
Mitigation Recommendations
European organizations should enforce strict mobile device management (MDM) policies to ensure timely installation of Android security updates, particularly the September 2025 security bulletin addressing CVE-2025-48561. They should restrict installation of apps from untrusted sources and implement application allowlisting to prevent rogue apps from being installed. Security awareness training should emphasize risks of installing unknown apps and encourage vigilance against social engineering. Organizations should monitor device behavior for unusual graphical operations or performance anomalies that could indicate side-channel exploitation. Developers of sensitive apps (e.g., authenticators, banking apps) should consider implementing opt-out mechanisms to prevent their app activities from being rendered or blurred by other apps, reducing exposure to pixel stealing. Collaboration with device manufacturers and Google to accelerate patch deployment and address workarounds is critical. Endpoint detection and response (EDR) solutions with mobile capabilities should be tuned to detect suspicious app layering or intent abuse. Finally, organizations should consider multi-factor authentication methods that do not rely solely on on-screen codes, such as hardware tokens or biometric factors, to mitigate the impact of 2FA code theft.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/new-pixnapping-android-flaw-lets-rogue.html","fetched":true,"fetchedAt":"2025-10-15T01:26:52.901Z","wordCount":1326}
Threat ID: 68eef85f55734f1608e47853
Added to database: 10/15/2025, 1:26:55 AM
Last enriched: 10/15/2025, 1:27:49 AM
Last updated: 10/16/2025, 12:55:24 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Warned of Exploited Adobe AEM Forms Vulnerability
MediumCisco Routers Hacked for Rootkit Deployment
MediumThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More
MediumTwo New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped
MediumPixnapping Attack Lets Attackers Steal 2FA on Android
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.