New 'Pixnapping' attack lets hackers steal Android chats, 2FA codes in seconds

And there's not much you can do about it (yet).
Android logo on Android device
Pixnapping attacks can put data from your Android device directly in the hands of hackers. Credit: CFOTO/Future Publishing via Getty Images

Cybersecurity researchers have discovered a new type of attack that affects Android devices, and they say it lets hackers get their hands on your private data in a matter of seconds.

This includes your private chats, text messages, emails, and even two-factor authentication (2FA) codes, as Ars Technica reported.

The attack, dubbed "Pixnapping" by the team of researchers who discovered it, can be used to extract information from any data displayed on the screen. First, the victim has to download a malicious app. Once the app is installed, a Pixnapping attack can occur without the victim providing any further device permissions.


You May Also Like

Recommended deals for you

Apple AirPods Pro 3 Noise Cancelling Heart Rate Wireless Earbuds $219.99 (List Price $249.00)

Apple iPad 11" 128GB Wi-Fi Retina Tablet (Blue, 2025 Release) $274.00 (List Price $349.00)

Amazon Fire HD 10 32GB Tablet (2023 Release, Black) $69.99 (List Price $139.99)

Sony WH-1000XM5 Wireless Noise Canceling Headphones $248.00 (List Price $399.99)

Blink Outdoor 4 1080p Security Camera (5-Pack) $159.99 (List Price $399.99)

Fire TV Stick 4K Streaming Device With Remote (2023 Model) $24.99 (List Price $49.99)

Shark AV2511AE AI Robot Vacuum With XL Self-Empty Base $249.99 (List Price $599.00)

Apple Watch Series 11 (GPS, 42mm, S/M Black Sport Band) $339.00 (List Price $399.00)

WD 6TB My Passport USB 3.0 Portable External Hard Drive $138.65 (List Price $179.99)

Dell 14 Premium Intel Ultra 7 512GB SSD 16GB RAM 2K Laptop $999.99 (List Price $1549.99)

Products available for purchase through affiliate links. If you buy something through links on our site, Mashable may earn an affiliate commission.

"Anything that is visible when the target app is opened can be stolen by the malicious app using Pixnapping," reads a message on the Pixnapping website, a resource created by researchers to share information on the attack. "Chat messages, 2FA codes, email messages, etc. are all vulnerable since they are visible."

According to the Pixnapping website, the vulnerability is detailed in a new research paper, part of a collaboration between seven researchers at the University of California, Berkeley, University of Washington, University of California, San Diego, and Carnegie Mellon University. A preprint of the paper, titled “Pixnapping: Bringing Pixel Stealing out of the Stone Age,” is available online and will be published this week at the 32nd ACM Conference on Computer and Communications Security in Taiwan.

Mashable Light Speed
Want more out-of-this world tech, space and science stories?
Sign up for Mashable's weekly Light Speed newsletter.
By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up!

Information that can not be displayed on the Android device's screen, such as a secret key that is obscured using asterisks for example, cannot be stolen by the hackers in a Pixnapping attack. This is because of the way the attack is carried out.

Once a victim installs the malicious app, it weaponizes the Android API to target other apps with access to sensitive data. The app then accesses the pixels displayed on the screen using an unintended data leak, also known as a hardware side channel. The malicious app pushes those individual pixels through the rendering pipeline, where the Pixnapping attack then performs graphical operations. This continues until optical character recognition, or OCR, can occur, meaning the app can extract text from visuals.

In effect, any information that's displayed on your device's screen can then be stolen.

"Conceptually, it is as if the malicious app was taking a screenshot of screen contents it should not have access to," the Pixnapping site reads.

Researchers tested the Pixnapping attack on Google Pixel 6 through 9 smartphones, as well as the Samsung Galaxy S25, running numerous different versions of the Android mobile operating system, from Android 13 to 16.

While this is certainly concerning news, researchers say that they are unaware of any real-world examples of the exploit being used in the wild. 

The team of cybersecurity researchers informed Google of the Android vulnerability in February. Google released its first patch for Pixnapping last month. However, the researchers discovered a workaround within days, and informed Google once again. Google says it will release an additional Pixnapping patch in its December Android security bulletin.

Mashable Potato

Recommended For You
Character.AI to shut down chats for teens
A child looks at a computer with a phone in the foreground bearing the Character.AI logo.



OpenAI tests ChatGPT group chats. How to try it for yourself.
ChatGPT home screen

Character.AI debuts choose-your-own-adventure Stories for teens
The Charcter.AI logo on a smartphone

Trending on Mashable
NYT Connections hints today: Clues, answers for November 29, 2025
Connections game on a smartphone

Streaming just got cheaper: Black Friday deals still live on Hulu, HBO Max, Apple TV, Disney+, and more
Disney+, Hulu, HBO Max, Peacock, and Prime Video logos with colorful background and black friday icon

Wordle today: Answer, hints for November 29, 2025
Wordle game on a smartphone

The 23 best Black Friday PlayStation game deals still live (updated)
helldivers II, clair obscur, and silent hill f on pink background

NYT Connections hints today: Clues, answers for November 28, 2025
Connections game on a smartphone
The biggest stories of the day delivered to your inbox.
These newsletters may contain advertising, deals, or affiliate links. By clicking Subscribe, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up. See you at your inbox!