{"id":225691,"date":"2025-10-15T04:37:11","date_gmt":"2025-10-15T04:37:11","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/225691\/"},"modified":"2025-10-15T04:37:11","modified_gmt":"2025-10-15T04:37:11","slug":"new-android-pixnapping-attack-steals-mfa-codes-pixel-by-pixel","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/225691\/","title":{"rendered":"New Android Pixnapping attack steals MFA codes pixel-by-pixel"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"New Android Pixnapping attack steals MFA codes pixel-by-pixel\" height=\"900\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/10\/Android_cracks.jpg\" width=\"1600\"\/><\/p>\n<p>A new side-channel attack called Pixnapping enables a malicious Android app with no permissions to extract sensitive data by stealing pixels displayed by applications or websites, and reconstructing them to derive the content.<\/p>\n<p>The content may include\u00a0sensitive private data like chat messages from secure communication apps like Signal, emails on Gmail, or two-factor authentication codes from Google Authenticator.<\/p>\n<p>The attack, devised and demonstrated by a team of\u00a0seven American university researchers, works on fully patched modern Android devices and can steal 2FA codes in less than 30 seconds.<\/p>\n<p>Google attempted to fix the problem (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48561\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-48561<\/a>)\u00a0in the\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-fixes-actively-exploited-android-flaws-in-september-update\/\" target=\"_blank\" rel=\"nofollow noopener\">September Android update<\/a>. However, researchers were able to bypass the mitigation\u00a0and an effective solution is expected in the December 2025 Android security update.<\/p>\n<p>How Pixnapping works<\/p>\n<p>The attack starts with a malicious app abusing Android\u2019s intents system to launch the target app or webpage,\u00a0so its window is submitted to the system\u2019s composition process (SurfaceFlinger), which is responsible for combining multiple windows when they are visible at the same time.<\/p>\n<p>In the next step, the malicious app maps the target pixels (for instance, the pixels forming the digit of a 2FA code) and determines through multiple graphical operations if they are white or non-white.<\/p>\n<p>Isolating each pixel is possible by opening what the researchers call a &#8216;masking activity&#8217;, which sits in the foreground, hiding the target app. Then the attacker makes the cover window &#8220;all\u00a0opaque white pixels except for the pixel at the attacker-chosen location which is set to be\u00a0transparent.&#8221;<\/p>\n<p>During the\u00a0Pixnapping attack, the isolated pixels are enlarged, leveraging a &#8220;quirk&#8221; in the way SurfaceFlinger implements blur that produces a stretch-like\u00a0effect.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Blurred region stretched to fill a larger patch\" height=\"326\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/10\/blur.jpg\" width=\"519\"\/>Blurred 1&#215;1 sub-region stretched into a larger colored patch<br \/>Source: pixnapping.com<\/p>\n<p>After recovering all the victim pixels, an OCR-style technique is used to differentiate each character or digit.<\/p>\n<p>&#8220;Conceptually, it is as if the malicious app was taking a screenshot of screen contents it should not have access to,&#8221; the researchers <a href=\"https:\/\/www.pixnapping.com\/\" target=\"_blank\" rel=\"nofollow noopener\">explain<\/a>.<\/p>\n<p>To steal the data, the researchers used the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/modern-gpus-vulnerable-to-new-gpuzip-side-channel-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">GPU.zip side-channel attack<\/a>, which exploits graphical data compression in modern GPUs to leak visual information.<\/p>\n<p>Although the data leakage rate is relatively low, ranging from 0.6 to 2.1 pixels per second, optimizations demonstrated by the researchers show that 2FA codes or other sensitive data can be exfiltrated in less than 30 seconds.<\/p>\n<\/p>\n<p>Impact on Android<\/p>\n<p>The researchers demonstrated Pixnapping on Google Pixel 6, 7, 8, and 9 devices, as well as Samsung Galaxy S25, running Android versions 13 through 16, and all of them were vulnerable to the new side-channel attack.<\/p>\n<p>Since the underlying mechanisms that make Pixnapping effective are found on older Android versions, likely, most Android devices and older OS versions are also vulnerable.<\/p>\n<p>The researchers analyzed nearly 100,000 Play Store apps, finding hundreds of thousands of invocable actions through Android intents, indicating that the attack is broadly applicable.<\/p>\n<p>The technical paper presents the following examples of data theft:<\/p>\n<p>Google Maps: Timeline entries occupy ~54,264\u201360,060 pixels; unoptimized recovery of an entry takes ~20\u201327 hours across devices.&#13;<br \/>\n\tVenmo: activities (profile, balance, transactions, statements) are openable via implicit intents; account-balance regions are ~7,473\u201311,352 pixels and leak in ~3\u20135 hours unoptimized.&#13;<br \/>\n\tGoogle Messages (SMS): explicit\/implicit intents can open conversations. Target regions are ~35,500\u201344,574 pixels; unoptimized recovery takes ~11\u201320 hours. Attack distinguishes sent vs received by testing blue vs non-blue or gray vs non-gray pixels.&#13;<br \/>\n\tSignal (private messages): implicit intents can open conversations. Target regions are ~95,760\u2013100,320 pixels; unoptimized recovery takes ~25\u201342 hours, and the attack worked even with <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/signal-now-blocks-microsoft-recall-screenshots-on-windows-11\/\" target=\"_blank\" rel=\"nofollow noopener\">Signal\u2019s Screen Security<\/a> enabled.&#13;<\/p>\n<p>Both Google and Samsung have committed to fixing the flaws before the end of the year, but no GPU chip vendor has announced patching plans for the GPU.zip\u00a0side-channel attack.<\/p>\n<p>While the original exploit method was mitigated in September, Google received an updated attack that demonstrated a bypass for the original fix. Google has developed a more thorough patch to be released with the Android security updates for December.<\/p>\n<p>Google says that leveraging this data leak technique requires specific data about the targeted device, which, as the researchers noted, leads to a low success rate.\u00a0Current verifications found no malicious apps on Google Play leveraging\u00a0the Pixnapping vulnerability.<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03LvVKm0\" target=\"_blank\" rel=\"noopener sponsored nofollow\"><br \/>\n            <img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/10\/bas-summit.jpg\" alt=\"Picus BAS Summit\"\/><br \/>\n        <\/a><\/p>\n<p>Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation.<\/p>\n<p>Don&#8217;t miss the event that will shape the future of your security strategy<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03LvVKm0\" target=\"_blank\" rel=\"noopener sponsored nofollow\">Register Now<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"A new side-channel attack called Pixnapping enables a malicious Android app with no permissions to extract sensitive data&hellip;\n","protected":false},"author":2,"featured_media":225692,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41],"tags":[165,74],"class_list":{"0":"post-225691","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobile","8":"tag-mobile","9":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/225691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=225691"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/225691\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/225692"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=225691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=225691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=225691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}