Close Menu
maincoin.money
    What's Hot

    DeFiLlama Subtly Reintroduces Aster Following Data Integrity Controversy

    October 20, 2025

    Analysts Suggest Bitcoin Pioneers Cashing Out Are Holding Prices Down

    October 20, 2025

    Institutions Capitalize on Price Drops During October Crypto Market Volatility

    October 20, 2025
    Facebook X (Twitter) Instagram
    maincoin.money
    • Home
    • Altcoins
    • Markets
    • Bitcoin
    • Blockchain
    • DeFi
    • Ethereum
    • NFTs
      • Regulation
    Facebook X (Twitter) Instagram
    maincoin.money
    Home»DeFi»Android Flaw Puts Recovery Phrases and 2FA Codes at Risk
    DeFi

    Android Flaw Puts Recovery Phrases and 2FA Codes at Risk

    Ethan CarterBy Ethan CarterOctober 14, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    1760485013
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A newly identified vulnerability in Android allows malicious apps to access content displayed by other applications, potentially putting crypto wallet recovery phrases, two-factor authentication (2FA) codes, and more at risk.

    A recent research paper outlines the “Pixnapping” attack, which “bypasses all browser mitigations and can even steal secrets from non-browser apps.” This is achievable by using Android application programming interfaces (API) to determine the content of a specific pixel from a different application.

    The attack mechanism is not simply the malicious app requesting display content from another app. Rather, it involves layering a series of attacker-controlled, semi-transparent activities that obscure all but a selected pixel, and then manipulating that pixel so its color becomes dominant in the frame.

    By repeating this process and synchronizing frame renders, the malware can deduce those pixels to recreate on-screen secrets. Fortunately, this method is time-consuming, which limits its usefulness against content that is only visible for brief moments.

    0199e2a7 805d 7af8 9ebc b844af1bb482
    Pixnapping visual representation. Source: Pixnapping research paper

    Seed phrases in danger

    One category of especially sensitive information that tends to remain visible longer than a few seconds is crypto wallet recovery phrases. These phrases grant full, unrestricted access to the associated crypto wallets and must be noted down for security. The research evaluated the attack on 2FA codes on Google Pixel devices:

    “Our attack successfully recovers the entire 6-digit 2FA code in 73%, 53%, 29%, and 53% of trials on the Pixel 6, 7, 8, and 9, respectively. The average time taken to recover each 2FA code is 14.3, 25.8, 24.9, and 25.3 seconds for the Pixel 6, Pixel 7, Pixel 8, and Pixel 9, respectively.“

    Although it would take significantly longer to capture a complete 12-word recovery phrase, the attack remains feasible if the user leaves the phrase visible while noting it down.

    Related: UK renews Apple iCloud backdoor push, threatening crypto wallet security

    Google’s response

    The vulnerability was tested on five devices running Android versions 13 to 16: the Google Pixel 6, Google Pixel 7, Google Pixel 8, Google Pixel 9, and the Samsung Galaxy S25. Researchers indicated the same attack could be executed on other Android devices, given the APIs being exploited are widely available.

    Google initially attempted to remedy the issue by restricting the number of activities an app can blur simultaneously. Nonetheless, researchers found a workaround that enables Pixnapping to persist.

    “As of October 13, we are still in talks with Google and Samsung regarding disclosure timelines and mitigations.“

    The paper reported that Google classified the issue as high severity and pledged to provide a bug bounty to the researchers. The team also alerted Samsung that “Google’s patch was insufficient to safeguard Samsung devices.”

    Related: Best crypto hardware wallets for 2025

    Hardware wallets offer safe protection

    The most straightforward solution is to avoid displaying recovery phrases or any other highly sensitive information on Android devices. Ideally, users should refrain from showing recovery information on any internet-enabled device.

    A practical solution to this issue is to utilize a hardware wallet, a dedicated device for key management that signs transactions externally to a computer or smartphone without ever revealing the private key or recovery phrase. As threat researcher Vladimir S stated in an X post on the topic:

    “Simply don’t use your phone to secure your crypto. Use a hardware wallet!“

    Magazine: ‘Help! My robot vac is stealing my Bitcoin’: When smart devices attack