New Android Security Threat ‘Pixnapping’ Allows Hackers to Read Screen Data Without Permissions

Researchers discovered a new Android vulnerability called Pixnapping, allowing hackers to steal on-screen data like 2FA codes, messages, and locations within seconds. Google confirmed the issue and released security patches to protect Android users worldwide.

New Android Security Threat ‘Pixnapping’ Allows Hackers to Read Screen Data Without Permissions

A new cyberattack called Pixnapping has been discovered by security researchers, raising serious concerns about Android device security.This advanced hacking technique allows cybercriminals to steal private data, including two-factor authentication (2FA) codes, chat messages, and location history, from Android apps in less than a minute. Developed by experts from the University of California, University of Washington, and Carnegie Mellon University, the attack was successfully tested on Google Pixel phones and the Samsung Galaxy S25, with detailed findings published in their research paper titled “Pixnapping: Bringing Pixel Stealing out of the Stone Age.”

What Makes Pixnapping So Dangerous?

Pixnapping exploits how Android processes graphics and pixels on the screen. Unlike regular malware that needs permissions or screenshots, it directly reads pixel data, the tiny colored dots forming everything on your display. In simple terms, it allows a hacker’s app to silently “see” what’s on your screen without recording it. Researchers found that anything visible like messages, 2FA codes, or emails that can be stolen, while hidden or non-displayed data inside apps remains safe.

Understanding How Pixnapping Operates

The process begins when a user unknowingly installs a malicious app. This app quietly uses Android’s APIs (Application Programming Interfaces) to interact with other apps like Gmail, Google Authenticator, or messaging apps. It then tricks these apps into showing certain information, such as 2FA codes or chat messages. After that, the malicious app measures how long it takes the phone’s rendering system, the part that draws what you see on the screen to display different pixels. By studying these tiny timing differences, hackers can slowly rebuild what’s on the screen, almost like creating a screenshot without actually taking one. According to lead researcher Alan Linghao Wang, this method lets a hacker’s app secretly “see” your screen content even when it shouldn’t have access.

Google’s Response and What Android Users Should Do

Google acknowledged the Pixnapping issue and included a partial security patch in the September 2025 Android version, with a full update due in December 2025. The company noted that there is currently no proof of real-world incidents, but researchers warn that even after the September patch, some devices may still be vulnerable to a modified version of Pixnapping.This means that many Android users may be at risk until all manufacturers issue complete patches.

Pixnapping reveals a deeper vulnerability in Android's graphics and security layers, demonstrating that even the visuals on your screen can be attacked. To stay safe, experts highly advise users to keep their devices up to date with the latest security updates, avoid downloading apps from unknown sources, and utilize reputable mobile security programs that identify unusual behavior.

Cyber threats such as Pixnapping demonstrate that hackers are growing more adept at devising new ways to steal valuable information. Regular updates, careful app installation, and powerful mobile protection remain Android users' strongest defenses against such growing threats.

Information referenced in this article is from The Indian Express