Android’s Pixnapping Attack Can Steal 2FA Codes and Private Messages

Malicious apps exploit GPU timing to read 2FA codes and private messages across Google and Samsung devices

Rex Freiberger Avatar
Rex Freiberger Avatar

By

Our editorial process is built on human expertise, ensuring that every article is reliable and trustworthy. AI helps us shape our content to be as accurate and engaging as possible.
Learn more about our commitment to integrity in our Code of Ethics.

Image credit: Wikimedia

Key Takeaways

Key Takeaways

  • Pixnapping attack steals 2FA codes by exploiting Android GPU timing without permissions
  • Gmail, Signal, Venmo, and Google Authenticator confirmed vulnerable to pixel reconstruction
  • Google patches fail to fully prevent modified attacks on Samsung devices

Malicious apps can now steal sensitive data by exploiting your phone’s graphics processing without requesting any permissions.

Your Android phone just became a surveillance device, and you probably don’t even know it. The newly discovered Pixnapping attack lets malicious apps steal your two-factor authentication codes, private messages, and any sensitive information displayed on screen—without requesting a single permission.

This isn’t your typical app store scam where sketchy developers ask for camera and microphone access. Pixnapping exploits Android’s visual rendering pipeline itself, measuring how long it takes your phone’s GPU to process specific pixels. Think of it like a digital safecracker listening for tumbler clicks, except the “clicks” are microsecond differences in graphics processing time.

Here’s how your phone betrays you: A malicious app triggers another app—say, Google Authenticator—to display your 2FA code. While that code appears on screen, the attacker app performs graphics operations on specific pixel locations, timing how long each operation takes. Different colors process at slightly different speeds, allowing the malicious code to reconstruct what’s actually displayed.

Your six-digit authentication code becomes readable text for the attacker.

Major Apps Under Siege

Gmail, Signal, Venmo, and Google Authenticator have all been confirmed as vulnerable targets.

  • Gmail
  • Signal
  • Venmo
  • Google Authenticator

All are confirmed vulnerable. Essentially, any app displaying sensitive information becomes a potential target. The attack works across Google and Samsung devices, with researchers suggesting the underlying vulnerability likely affects many more Android phones with the right modifications.

Google released patches attempting to fix the issue, but security researchers demonstrated that modified versions of the attack still work even after updates. Samsung acknowledged the vulnerability but classified it as “low-severity” due to its technical complexity—a response that feels tone-deaf when your banking codes are at stake.

The scariest part? This attack highlights fundamental gaps in Android’s security model. Your phone’s permission system, designed to protect against obvious threats, becomes completely irrelevant when attackers can exploit the basic mechanics of how Android displays information.

Your takeaway isn’t paranoia—it’s vigilance. Install apps only from trusted sources, keep your device updated despite incomplete patches, and recognize that your Android’s visual system has become another attack surface. The era of assuming app sandboxing keeps you safe just ended with a few milliseconds of GPU timing measurements.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →