Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

GoWish shopping and wish list app has its biggest year yet

Samsung’s zero-click flaw is exploited to deploy LANDFALL Android spyware via WhatsApp

TechCrunch Disrupt 2025 Startup Battlefield 200: Celebrating outstanding achievements

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Samsung’s zero-click flaw is exploited to deploy LANDFALL Android spyware via WhatsApp
Identity

Samsung’s zero-click flaw is exploited to deploy LANDFALL Android spyware via WhatsApp

userBy userNovember 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 7, 2025Ravi LakshmananMobile security/vulnerability

A patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day in a targeted attack in the Middle East to deliver “commercial-grade” Android spyware called LANDFALL.

According to Palo Alto Networks Unit 42, this activity involves exploitation of CVE-2025-21042 (CVSS score: 8.8), an out-of-bounds write flaw in the ‘libimagecodec.quram.so’ component, which may allow remote attackers to execute arbitrary code. This issue was resolved by Samsung in April 2025.

“This vulnerability was actively exploited in the wild before being patched by Samsung in April 2025 following reports of real-world attacks,” Unit 42 said. Based on VirusTotal submission data, potential targets for this operation, tracked as CL-UNK-1054, are located in Iraq, Iran, Turkey, and Morocco.

This development comes after Samsung revealed in September 2025 that another flaw in the same library (CVE-2025-21043, CVSS score: 8.8) was also exploited as a zero-day. There is no evidence that this security flaw was weaponized in the LANDFALL campaign.

DFIR retainer service

The attack is assessed to have involved sending malicious images in the form of DNG (digital negative) files via WhatsApp, with evidence in the LANDFALL sample dating back to July 23, 2024. This is based on a DNG artifact with a name such as “WhatsApp Image 2025-02-10 at 4.54.17 PM.jpeg”. “IMG-20240723-WA0000.jpg”

Once installed and running, LANDFALL acts as a comprehensive spying tool that can collect sensitive data such as microphone recordings, location information, photos, contacts, SMS, files, and call logs. This exploit chain likely involved the use of a zero-click approach to trigger the CVE-2025-21042 exploit without requiring user interaction.

LANDFALL spyware flowchart

Notably, around the same time, WhatsApp announced that a flaw in its messaging app for iOS and macOS (CVE-2025-55177, CVSS score: 5.4) was linked to a flaw in Apple iOS, iPadOS, and macOS, CVE-2025-43300 (CVSS score: 8.8), as part of a sophisticated campaign. It has been revealed that it may target users of less than a person. Apple and WhatsApp have since patched the flaw.

A timeline of recent malicious DNG image files and associated exploit activity.

Unit 42’s analysis of the discovered DNG files revealed an embedded ZIP file appended to the end of the file, which was used by the exploit to extract shared object libraries from the archive and run spyware. The archive also has another shared object designed to manipulate the device’s SELinux policy to grant elevated permissions to LANDFALL and facilitate persistence.

CIS build kit

The shared object that loads LANDFALL communicates with the command and control (C2) server over HTTPS, enters a beacon loop, and receives an unspecified next-stage payload for subsequent execution.

It is currently unknown who is behind the spyware or campaign. That said, Unit 42 said that while LANDFALL’s C2 infrastructure and domain registration patterns match those of Stealth Falcon (also known as FruityArmor), no direct overlap between the two clusters has been detected as of October 2025.

“Since samples first appeared in July 2024, this activity highlights how advanced exploits can remain in public repositories for long periods of time until they are fully understood,” Unit 42 said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTechCrunch Disrupt 2025 Startup Battlefield 200: Celebrating outstanding achievements
Next Article GoWish shopping and wish list app has its biggest year yet
user
  • Website

Related Posts

From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools

November 7, 2025

Logic bomb hidden in malware-laden NuGet package is set to explode several years after installation

November 7, 2025

Enterprise credentials are at risk – are they the same now?

November 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

GoWish shopping and wish list app has its biggest year yet

Samsung’s zero-click flaw is exploited to deploy LANDFALL Android spyware via WhatsApp

TechCrunch Disrupt 2025 Startup Battlefield 200: Celebrating outstanding achievements

Congressional Budget Office admits it was hacked

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.