The Alarming Truth: Hackers Can Steal 2FA Codes and Private Messages from Android Phones
A shocking new report reveals that hackers can steal 2FA codes and private messages from Android phones — and what’s worse, there’s no official fix yet. The attack, dubbed “EvilParcel”, exposes a severe security vulnerability in Android’s inter-process communication (IPC) mechanism that can allow malicious apps to bypass system protections and steal sensitive information directly from other apps.
This flaw affects a wide range of Android devices, including Samsung, Google Pixel, OnePlus, Xiaomi, and other major brands. Security researchers have warned that until Google releases a patch, millions of Android users remain vulnerable to this stealthy cyberattack.

🚨 What’s Behind This Attack?
At the heart of the issue lies Android’s Accessibility Service, a feature designed to help users with disabilities interact with their devices more easily.
Unfortunately, cybercriminals have found a way to abuse this system, tricking users into enabling accessibility access for malicious apps.
Once granted, these apps can:
- 🕵️♂️ Read notification content (including OTPs and 2FA codes).
- 📄 Capture private messages from apps like WhatsApp or Telegram.
- 🔓 Perform actions on behalf of the user, such as approving permissions or tapping system buttons.
In essence, hackers can bypass two-factor authentication — one of the most important security measures protecting your online identity.
🧠 How the Exploit Works — Step by Step
Here’s how attackers use this vulnerability to their advantage:
| 🧩 Step | 🔍 What Happens |
|---|---|
| 1️⃣ | A hacker disguises a malicious app as a useful tool (e.g., cleaner, booster, or utility app). |
| 2️⃣ | The user installs the app and unknowingly enables Accessibility access. |
| 3️⃣ | The app now gains access to notifications and system functions. |
| 4️⃣ | Hackers can intercept 2FA codes, messages, and even simulate screen taps. |
| 5️⃣ | All captured data is sent to a remote server — silently. |
This method requires no complex malware or rooting, which makes it simple yet devastatingly effective.

📡 Who’s Affected?
Early reports confirm that the exploit affects Android 11 through Android 14, spanning most major brands such as:
- Samsung
- OnePlus
- Xiaomi
- Vivo
- Google Pixel
Because the Accessibility API is a core Android component, nearly every device running a recent Android version is potentially vulnerable.
🔍 Google has acknowledged the issue but has yet to release a software patch.
⚠️ Why This Vulnerability Is So Dangerous
What makes this exploit particularly terrifying is how silent and invisible it is. Unlike traditional malware, it doesn’t need suspicious downloads or visible pop-ups — just a single tap from the user to grant permission.
Here’s why cybersecurity experts are sounding the alarm:
| ⚠️ Reason | 💡 Impact |
|---|---|
| Misuse of accessibility permissions | Allows full control of device interface |
| No antivirus alert | Bypasses traditional security tools |
| Real-time data access | Steals OTPs and messages instantly |
| Easy to disguise | Appears as a legitimate app |
In other words, your best security tool can quickly turn into your biggest weakness.
🔐 How to Protect Yourself
While we wait for Google to patch this exploit, users must take immediate precautions to minimize risk.
✅ Do’s:
- Revoke Accessibility Access:
→ Go to Settings → Accessibility → Installed Services and disable unnecessary access. - Use Authenticator Apps:
Switch to Google Authenticator, Microsoft Authenticator, or Authy instead of SMS-based codes. - Keep Software Updated:
Install every Android security patch as soon as it becomes available. - Download Only from Google Play Store:
Avoid third-party APKs or unknown app sources. - Turn on Google Play Protect:
It regularly scans and warns about harmful apps.
❌ Don’ts:
- Don’t grant Accessibility access to apps unless you fully trust them.
- Don’t use the same password across multiple accounts.
- Don’t sideload apps or click suspicious links shared via SMS or email.
💡 Pro Tip: Combine a password manager with an authenticator app for layered protection against phishing and credential theft.
🧱 Android Security: Past vs. Present
| 🔍 Feature | 📅 Android 10–12 | 🚨 Android 13–14 (Current) |
|---|---|---|
| Accessibility Permission Handling | Limited, transparent prompts | Easier to exploit via UI overlays |
| Notification Data Access | Restricted by system rules | Can be bypassed through accessibility services |
| Monthly Security Updates | Reliable | Still ongoing, but patch pending |
| 2FA Code Security | Generally safe | Vulnerable to accessibility abuse |
Despite Android’s evolution, this exploit highlights a major oversight — one that compromises the foundation of user trust and authentication safety.
⚖️ Pros and Cons of Android Accessibility Feature
| ✅ Pros | ❌ Cons |
|---|---|
| Enables accessibility for users with disabilities | Can be hijacked by malicious apps |
| Improves user experience through automation | Grants too much control to apps |
| Enhances productivity and customization | Lacks strict user permission alerts |
Accessibility features are critical — but they desperately need stricter controls and better user awareness to prevent misuse.
📰 Google’s Response So Far
A spokesperson from Google told Ars Technica:
“We’re aware of the issue and are working to improve protections. Updates will be provided as soon as more information is available.”
However, no concrete patch timeline has been shared, leaving users to fend for themselves for now.
In the meantime, security experts from ESET, Kaspersky, and Bitdefender advise users to disable accessibility permissions for all non-essential apps.
🛡️ Expert Recommendations
Here’s what cybersecurity specialists recommend doing right away:
- 🔐 Use biometric authentication (fingerprint, face ID) wherever possible.
- 🧩 Set app-level PINs for banking or payment apps.
- 🕵️♀️ Regularly review app permissions — once a week is ideal.
- 🌐 Monitor login alerts from Google, Facebook, and other platforms.
- 📱 Perform a factory reset if you suspect infection and reconfigure all 2FA keys afterward.
❓ Frequently Asked Questions (FAQ)
Q1. Can hackers really steal 2FA codes from Android phones?
👉 Yes. If a malicious app gains accessibility access, it can read notification contents, including OTPs and verification codes.
Q2. Are all Android phones at risk?
👉 Most Android 11–14 devices are vulnerable, depending on each brand’s patch version.
Q3. What’s the safest alternative to SMS 2FA?
👉 Use an authenticator app or hardware security key like YubiKey.
Q4. How can I see which apps have accessibility access?
👉 Go to Settings → Accessibility → Installed Services and review the list.
Q5. Has Google released a fix yet?
👉 As of now, no. Users must manually manage permissions and stay cautious until an official update is rolled out.
🧭 Final Thoughts
This exploit is a powerful reminder that even the most secure systems can be vulnerable if user permissions are misused.
Until Google rolls out a patch, your awareness is your strongest defense. Be selective with app permissions, switch to safer 2FA methods, and review accessibility settings regularly.
Stay informed. Stay alert. And most importantly — protect your digital identity like your life depends on it. 🔒📲

