TLDR Pixnapping steals on-screen data by reading pixel colors on Android devices. Attack recovered 2FA codes on Pixel 6 to 9 in up to 73% of tests. Google rated the issue high severity and is working on a full patch. Hardware wallets remain the safest way to store crypto recovery phrases. A new Android security [...] The post Pixnapping Android flaw lets hackers steal crypto wallet seed phrases appeared first on CoinCentral.TLDR Pixnapping steals on-screen data by reading pixel colors on Android devices. Attack recovered 2FA codes on Pixel 6 to 9 in up to 73% of tests. Google rated the issue high severity and is working on a full patch. Hardware wallets remain the safest way to store crypto recovery phrases. A new Android security [...] The post Pixnapping Android flaw lets hackers steal crypto wallet seed phrases appeared first on CoinCentral.

Pixnapping Android flaw lets hackers steal crypto wallet seed phrases

2025/10/15 14:07

TLDR

  • Pixnapping steals on-screen data by reading pixel colors on Android devices.
  • Attack recovered 2FA codes on Pixel 6 to 9 in up to 73% of tests.
  • Google rated the issue high severity and is working on a full patch.
  • Hardware wallets remain the safest way to store crypto recovery phrases.

A new Android security flaw has raised concerns among users of crypto wallets and authentication apps. Researchers have identified an attack method called “Pixnapping,” which allows malicious applications to reconstruct sensitive on-screen data such as recovery phrases and two-factor authentication (2FA) codes. The discovery indicates that even trusted devices could be at risk of revealing private information through manipulated screen pixels.

How the Pixnapping Attack Works

The Pixnapping method uses Android’s application programming interfaces (APIs) to calculate the color of individual pixels displayed by other applications. Unlike conventional screen capture attacks, the malicious app does not directly access another app’s display. 

Instead, it layers semi-transparent activities over the target app, masking all but a chosen pixel. By manipulating that pixel repeatedly, attackers can infer its color and reconstruct visual content from the screen.

Researchers explained that this process involves timing frame renders and scanning one pixel at a time, which enables the malware to rebuild what was shown on screen. Although the attack is slow, it is still capable of capturing information that remains visible for more than a few seconds, such as recovery phrases or long authentication codes.

Risk to Crypto Wallet Recovery Phrases

The research team warned that Pixnapping poses a particular danger to crypto wallet users. Recovery phrases, which provide full access to digital wallets, often stay visible while users write them down. According to the study, the attack successfully retrieved full 6-digit 2FA codes in several tests on Google Pixel devices.

The success rate reached 73% on the Pixel 6, 53% on the Pixel 7, 29% on the Pixel 8, and 53% on the Pixel 9. The average time to recover each 2FA code ranged from 14 to 26 seconds, depending on the device model. While recovering a full 12-word seed phrase would take much longer, the researchers confirmed that it remains possible if the phrase stays displayed.

Google’s Response and Ongoing Coordination

The vulnerability was tested on several devices running Android 13 to 16, including the Google Pixel 6 through Pixel 9 and the Samsung Galaxy S25. Since the attack relies on widely available APIs, the team warned that other Android devices could also be affected.

Google responded by limiting how many activities an app can blur at once. However, the researchers found a workaround that allowed Pixnapping to continue functioning. As of October 13, the researchers said they were still coordinating with Google and Samsung regarding disclosure timelines and security patches.

Google classified the issue as high severity and awarded a bug bounty to the research team. The team also informed Samsung that Google’s initial fix did not fully protect Samsung devices.

Hardware Wallets as a Safer Option

Experts advise users to avoid displaying recovery phrases or sensitive data on Android devices until a complete fix is available. Keeping recovery information offline or using a hardware wallet offers stronger protection.

A hardware wallet is a dedicated device that stores private keys securely and signs transactions without exposing them to connected smartphones or computers. Security researcher Vladimir S emphasized this in a post on X, stating, “Simply don’t use your phone to secure your crypto. Use a hardware wallet!”

Until Android patches the vulnerability, users are urged to exercise caution and avoid keeping recovery or authentication data visible on their screens for extended periods.

The post Pixnapping Android flaw lets hackers steal crypto wallet seed phrases appeared first on CoinCentral.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

ETH Whales Rebuild as Outflows Trim Supply, Price Retests $4K

ETH Whales Rebuild as Outflows Trim Supply, Price Retests $4K

The post ETH Whales Rebuild as Outflows Trim Supply, Price Retests $4K appeared on BitcoinEthereumNews.com. Ethereum whales add 218K ETH, reversing mid-October sell-offs and signaling renewed confidence. Exchange outflows rise as investors move ETH to private wallets, hinting at long-term holding. ETH holds near $3,900 amid lower trading volumes, reflecting consolidation after strong October gains. Santiment shows wallets holding 100 to 10,000 ETH re-accumulated roughly 218,470 ETH over the past week. That buying offsets a slice of the ~1.36 million ETH these cohorts sold between October 5 and 16.  Whales Reverse Course and Add 218K ETH After Mid-October Selling The flip from distribution to accumulation restores part of the liquidity removed earlier in the month and sets a more constructive backdrop if demand persists. 🐳🦈 Ethereum whales and sharks holding between 100 to 10,000 $ETH are finally showing some signs of confidence. After -1.36M was dumped by this group between October 5th and 16th, they have added back close to 1/6th of it since. Positive sign for crypto’s #2 market cap. pic.twitter.com/tg1BWu60Lq — Santiment (@santimentfeed) October 24, 2025 The add-back equals about one-sixth of what was sold, a cadence often seen during range repair after sharp pullbacks. The shift lines up with steady staking participation and consistent dApp activity, factors that help anchor ETH fundamentals while price compresses. Related: Ethereum Price Prediction: ETH Tests Recovery as Liquidity Clusters Build Above $4,200 Exchange Outflows Point to Self-Custody and Longer Holds Additional data from CoinGlass gives further insight into investor behavior. The ETH Spot Inflow/Outflow chart recorded heightened movement throughout mid-October, with alternating waves of deposits and withdrawals reflecting a tug-of-war between short-term traders and accumulating investors.  Notably, outflow spikes, indicating transfers from exchanges to private wallets, have increased in recent weeks, aligning with Santiment’s findings on accumulation. Ethereum’s price trend has remained resilient through these shifts. The asset’s value climbed from under $2,000 in early 2025…
Share
2025/10/25 20:37