Hackers Stealing 2FA Codes from Android Phones: Pixnapping Attack Explained (2025)

Your Android Phone's 2FA Codes Are at Risk: Here's How

Imagine receiving a notification on your phone, only to find out that your two-factor authentication (2FA) code has been compromised. Sounds alarming, right? But here's where it gets even more concerning: hackers can exploit a vulnerability in Android phones to steal 2FA codes and private messages. Let's dive into the details of this sophisticated attack.

The Pixnapping Attack: A Step-by-Step Breakdown

The Pixnapping attack involves a three-step process that allows hackers to intercept sensitive information. First, the malicious app tricks the victim into opening a legitimate app, such as Google Authenticator, while the attacker's app runs in the background. This sets the stage for the next step.

In the second step, the attacker's app performs graphical operations on individual pixels that the targeted app sent to the rendering pipeline. These operations select specific pixel coordinates that the app wants to steal and check if the color of those coordinates is white or non-white. For instance, if the attacker wants to steal a pixel that is part of the screen region where a 2FA character is rendered, they would look for pixels with non-white colors. But here's the clever part: the attacker can cause graphical operations to take longer or shorter amounts of time depending on the pixel color, effectively leaking information about the 2FA code.

The third step involves measuring the time required for each coordinate. By combining these times, the attack can rebuild the images sent to the rendering pipeline one pixel at a time. This process can be time-consuming, but in the case of 2FA codes, every second counts since each code is valid for only 30 seconds.

The Researchers' Findings: A Cause for Concern

The researchers who developed the Pixnapping attack were able to leak 100 different 2FA codes from Google Authenticator on various Google Pixel phones. The results were impressive, with the attack correctly recovering the full 6-digit 2FA code in 73%, 53%, 29%, and 53% of the trials on the Pixel 6, 7, 8, and 9, respectively. The average time to recover each 2FA code ranged from 14.3 to 25.8 seconds, depending on the device. However, the attack's success rate varied across devices, and the researchers were unable to leak 2FA codes within 30 seconds on the Samsung Galaxy S25 device due to significant noise.

What You Can Do: Stay Protected

Google has issued patches for CVE-2025-48561 in the September Android security bulletin, which partially mitigates this behavior. An additional patch is scheduled for release in the December Android security bulletin. While there is no evidence of in-the-wild exploitation, it's essential to stay vigilant and keep your device up-to-date.

The Debate: Is 2FA Still Secure?

This brings us to a crucial question: Is 2FA still a reliable means of securing your online accounts? Some might argue that the Pixnapping attack is a game-changer, rendering 2FA codes useless. Others might claim that the attack's complexity and device-specific limitations make it a low-risk threat. What do you think? Share your thoughts in the comments below.

Hackers Stealing 2FA Codes from Android Phones: Pixnapping Attack Explained (2025)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 6005

Rating: 4.6 / 5 (66 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.