By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: What The ‘Pixnapping’ Android Phone Attack Is (And Why You Should Be Worried) – BGR
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > What The ‘Pixnapping’ Android Phone Attack Is (And Why You Should Be Worried) – BGR
News

What The ‘Pixnapping’ Android Phone Attack Is (And Why You Should Be Worried) – BGR

News Room
Last updated: 2025/11/23 at 9:58 AM
News Room Published 23 November 2025
Share
What The ‘Pixnapping’ Android Phone Attack Is (And Why You Should Be Worried) – BGR
SHARE






Mohd Izzuan/Getty Images

Imagine most of your phone being secure, free from malicious snooping, save for the pixels on the screen. That’s the idea behind ‘pixnapping’, a new form of attack that U.S. researchers from several universities have discovered. A malicious app tricks the system into leaking digital pixel data, “one pixel at a time”, using transparent layers. It exploits Android’s application programming interfaces (APIs) to essentially rebuild layered screen captures. It may not sound serious, but using this method, hackers can steal sensitive data like two-factor authentication (2FA) codes. The technique can siphon information, like 2FA codes, within 14 to 25 seconds — codes expire after 30 seconds. That’s enough time to steal and use a valid code, bypassing your secure accounts.

It is worrisome, but there is relatively good news. Google already issued a patch that partially mitigates the problem. That patch limits the activities an app can invoke blur on, the function that allows transparent layers, and is what a pixnapping attack uses to capture data. But researchers have found a workaround. The attack, however, is not easy to carry out, and you need to install a malicious Android app first, then open it. Unfortunately, the malicious app does not need extra permissions to carry out the attack. Google says they are issuing an additional patch in the December Android security bulletin. For now, it still exists and could be deployed on many devices, including Samsung and Google Pixel models, used by the researchers to test their work. It’s never been more important to patch security vulnerabilities like this. It was recently discovered over one million Android devices were infected by a secret backdoor for hackers. Additionally, thousands of Android users installed infected apps, not unlike what would be needed for the pixnapping attack.

How does the ‘Pixnapping’ attack actually work?


Stranger in black hoodie using mobile to login.
Dilok Klaisataporn/Getty Images

A pixel is a single, tiny dot that constitutes the content you eventually see on your phone’s display. Thousands and millions of pixels make up the full image of what you see. But this pixnapping attack is able to isolate them, one-by-one, and then reconstruct the image to discern what you’re seeing. It doesn’t just affect two-factor authentication codes. For instance, hackers could rebuild anything sensitive shown on screen, even a message from encrypted apps like Signal. This was demonstrated by the research team — although it took 25 to 42 hours to complete.

The pixnapping attack takes advantage of something called Android Intents, a core system component that allows apps to communicate with one another and other Android devices, like sharing a photo or file. An intent works like a request, similar to a permission, where one app sends an ask to do something or interact with another app. Basically, the attack uses this process to stack transparent windows over the app it wants to see, then uses changes in the pixels and colors to capture and recombine the context of the content. Yes, you have to install an app that’s affected first, and then open it, but would-be thieves could easily disguise an app to look legitimate. 

Vulnerabilities like the one related to the pixnapping attack are regularly found in today’s software, creating a constant cat-and-mouse chase between nefarious hackers and developers or white-hat hackers. One of the most sophisticated iPhone attacks ever used relied on a hidden hardware feature — the Pegasus attack required no link tapping and used an iMessage exploit. Apple patched the vulnerability, but new attacks are continuously being discovered, and used by hackers.



Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Gurman: ‘Few signs internally’ point to Tim Cook stepping down as CEO early next year – 9to5Mac Gurman: ‘Few signs internally’ point to Tim Cook stepping down as CEO early next year – 9to5Mac
Next Article The Best Pinterest Marketing Tools For True Automation The Best Pinterest Marketing Tools For True Automation
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Black Friday PS5 deals: Save 0 now on PS5 Slim and PS5 Pro
Black Friday PS5 deals: Save $100 now on PS5 Slim and PS5 Pro
News
Week in Review: Most popular stories on GeekWire for the week of Nov. 16, 2025
Week in Review: Most popular stories on GeekWire for the week of Nov. 16, 2025
Computing
There’s stuff for kids of all ages — and grown-ups! — in these early Black Friday 2025 toy deals
There’s stuff for kids of all ages — and grown-ups! — in these early Black Friday 2025 toy deals
News
NVIDIA Preps 1.6Tb/s Networking For Linux 6.19
NVIDIA Preps 1.6Tb/s Networking For Linux 6.19
Computing

You Might also Like

Black Friday PS5 deals: Save 0 now on PS5 Slim and PS5 Pro
News

Black Friday PS5 deals: Save $100 now on PS5 Slim and PS5 Pro

1 Min Read
There’s stuff for kids of all ages — and grown-ups! — in these early Black Friday 2025 toy deals
News

There’s stuff for kids of all ages — and grown-ups! — in these early Black Friday 2025 toy deals

5 Min Read
5 Reasons Why You Should Run An AI Chatbot Locally On Your iPhone – BGR
News

5 Reasons Why You Should Run An AI Chatbot Locally On Your iPhone – BGR

9 Min Read
Fibre flies as improved 5G sees record UK mobile data consumption | Computer Weekly
News

Fibre flies as improved 5G sees record UK mobile data consumption | Computer Weekly

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?