Home » Technology » Android 2FA Code Theft Attack: How Hackers Steal Security Codes

Android 2FA Code Theft Attack: How Hackers Steal Security Codes

by Rachel Kim – Technology Editor

2FA Codes Remain vulnerable to “Pixnapping” Attack on android Despite⁢ Patches

A new attack dubbed “Pixnapping” allows hackers to potentially steal two-factor authentication (2FA) codes from Android phones, and while Google has released patches, the vulnerability isn’t fully resolved. Researchers ⁤demonstrated​ the ability‌ to extract 6-digit codes from Google Authenticator by analyzing how the app renders images on the screen.

The‍ attack operates in three stages. First, a malicious app is launched alongside the target app (like Google Authenticator).Second, the malicious app performs graphical operations on individual pixels the target app sends for rendering, determining if a pixel contains data (is‍ non-white) or is blank (white). This is achieved by opening windows in ‌front ‌of the target app and measuring ​rendering times – longer times indicate a pixel ⁢contains information. by meticulously measuring the time taken at each coordinate, the attack reconstructs the images sent to the rendering pipeline, pixel by pixel, revealing the‌ 2FA code.

Researchers optimized the attack to meet the 30-second time limit for valid 2FA codes. They reduced the number⁤ of samples taken per ‌pixel to 16 (from 34 or 64 in previous attacks)⁣ and decreased the delay between pixel reads to⁤ 70 milliseconds. Their implementation waits for the start of a new 30-second interval​ to maximize available ​time.

testing on Google‍ Pixel⁢ phones yielded varying⁤ success rates. the attack successfully recovered full 6-digit 2FA codes in 73% of trials‍ on ‌the Pixel 6,‍ 53% on the Pixel 7, 29% on the Pixel 8, and 53% on the Pixel⁢ 9. The average recovery times were 14.3‌ seconds (Pixel 6), 25.8 seconds​ (Pixel 7), 24.9 seconds (Pixel 8), and 25.3 seconds (Pixel‌ 9). However, the attack proved unsuccessful on a Samsung Galaxy S25 due to significant interference, and researchers noted further work​ is needed to adapt the technique for that device.

Google acknowledged the vulnerability, identified as CVE-2025-48561, and released a partial patch‌ in the September android security bulletin. An additional patch is ⁢planned for release in the December Android security bulletin. According to a Google representative,there is currently no evidence of this ⁢attack being exploited in the wild.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.