A group of cybersecurity researchers has revealed a new class of side-channel attack called Pixnapping, capable of stealing sensitive visual data directly from your Android device’s screen—including 2FA codes from Google Authenticator—in less than 30 seconds.
What makes this attack alarming is that it doesn’t require special permissions, root access, or even direct user interaction. It silently intercepts screen-rendered information from legitimate apps without leaving visible traces.
At TecnetOne, we break down how Pixnapping works, which devices are vulnerable, and how to defend yourself from this unprecedented threat.
Pixnapping is a side-channel attack targeting Android devices, exploiting visual data displayed on-screen instead of traditional vulnerabilities or password breaches.
It can extract:
Presented at ACM CCS 2025, the researchers demonstrated that Pixnapping can recover visual data in under 30 seconds without elevated privileges, using only the phone’s GPU and intent system.
You might also be interested in: New Android Malware Disguises Itself as Russian FSB Antivirus
Pixnapping exploits a combination of Android UI architecture and GPU compression behavior.
Here’s how it works:
Pixel stealing framework (Source: Cyber Security Nwes)
Pixnapping has been tested on modern Android devices, especially those using Mali GPUs:
Out of nearly 100,000 Android apps analyzed, 96,783 had at least one exported activity exploitable via intents.
Even web apps and browsers are at risk: 99.3% of the most-visited websites are susceptible due to iframe and overlay weaknesses.
This attack is uniquely stealthy:
It even bypasses security features of apps like Signal, which block screenshots, by directly reading pixel data from the GPU—not the screen itself.
Google has classified Pixnapping as high severity (CVE-2025-48561) and released a security patch for Pixel devices in September 2025.
However, Samsung has downplayed the issue, calling it low severity—a position many security researchers disagree with due to how replicable and dangerous the method is.
TecnetOne recommends the following steps:
Beyond the specific vulnerability, Pixnapping highlights a broader architectural weakness in Android:
Researchers suggest browser-style mitigations such as:
Learn more: How to Detect and Remove Spyware Apps on Android
For companies managing Android device fleets, Pixnapping presents a major security challenge.
TecnetOne recommends enterprise-level actions:
Pixnapping proves that attackers no longer need malware or password cracking to steal your data—reading pixels is enough.
This attack is silent, fast, and hard to detect—making it a perfect tool for targeted 2FA theft, identity fraud, and more.
At TecnetOne, we remind you: proactive security is the only real defense.
Keep your systems patched, apps vetted, and screen behavior monitored. In today’s threat landscape, your phone screen could be the next open window for attackers.