Pixel Stealing “Pixnapping”: A new exploit on Android

  • OCTOBER 29TH, 2025
  • 2min read
Pixel Stealing “Pixnapping”: A new exploit on Android

Introduction

Android devices are vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data in less than 30 seconds. Pixel-stealing ideas date back to 2013, which was fixed, but a group of researchers recently found new tricks for extracting sensitive data by measuring how specific pixels behave and reported it.

In this research paper, Alan Wang et al explains everything and the experiment they carried out. The researchers tested their framework on modern Google Pixel phones (6, 7, 8, 9) and a Samsung Galaxy S25 and succeeded in stealing secrets from both browsers and non-browser apps. They disclosed the findings to Google and Samsung in early 2025. As of October 2025, Google has patched part of the vulnerability, but some workarounds remain, and both companies are still working on a full fix by December. Other Android devices may also be vulnerable. CVE-2025-4856 is assigned to track this security flaw.

How it works

Pixnapping attacks begin with the malicious app invoking Android programming interfaces that cause the authenticator or other targeted apps to send sensitive information to the device screen. The malicious app then runs graphical operations on individual pixels of interest to the attacker. Pixnapping then exploits a side channel that allows the malicious app to map the pixels at those coordinates to letters, numbers, or shapes.

Precautions

  • Update regularly: Make sure your device and apps have the latest security updates.
  • Be cautious when installing apps: Only install apps from trusted sources like Google Play and check reviews and permissions before installing. Avoid sideloading unknown APKs and ask yourself if the permissions an app asks for are really needed for what you want it to do.
  • Review permissions: Android improved its permission system, but check regularly what apps can do, and don’t hesitate to remove permissions of the ones you don’t use often.
  • Use app screenshots wisely: Don’t store or display sensitive info (like codes, addresses, or logins) in apps unless needed, and close apps after use.
  • Enable Play Protect: Keep Play Protect active to help spot malicious apps before they’re installed.
  • Antimalware: Use up-to-date real-time anti-malware protection on your Android device, preferably with a web protection module.

Keywords

  • Primary: Pixnapping, Android exploit, CVE-2025-4856
  • Secondary: pixel stealing attack, Android vulnerability, Google Pixel security, Samsung Galaxy exploit, Android malware, 2FA theft, side-channel attack, data privacy

Explore more CIL Advisories

Review Bombing Attacks and Extortion

Review Bombing Attacks and Extortion

IntroductionMalicious actors use "review-bombing", a coordinated flood of fake, one-star reviews as an initial step for extortion. This high volume…

NOVEMBER 26TH, 2025

Read More
Synthetic Phishing: AI-Enabled Insider Impersonation

Synthetic Phishing: AI-Enabled Insider Impersonation

IntroductionThreat actors increasingly use artificial intelligence (AI) to impersonate trusted individuals such as executives, employees, or suppliers within organisations. These…

NOVEMBER 24TH, 2025

Read More
The Silent Security Threat: Data Hoarding

The Silent Security Threat: Data Hoarding

IntroductionThe greatest risk to your organization may be the sheer volume of data we hold, a practice known as Data…

NOVEMBER 19TH, 2025

Read More

Never miss a CIL Security Advisory

Stay informed with the latest security updates and insights from CIL.

Pixel Stealing “Pixnapping”: A new exploit on Android

Contact Us

Message Sent!

Thank you for reaching out. We have received your message and will get back to you shortly.

Check your email for a confirmation from us.

Start a project

Project Request Submitted!

Thank you for your interest. Our team will review your project details and reach out to you soon.

Check your email for a confirmation from us.

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Cookie Policy .