Loading cryptocurrency prices...

Samsung Galaxy Zero-Day Exploited by LANDFALL Android Spyware in Mideast

Samsung Galaxy zero-day flaw CVE-2025-21042 exploited to deliver LANDFALL spyware via malicious WhatsApp DNG images targeting Middle East users

  • A critical security flaw (CVE-2025-21042) in Samsung Galaxy Android devices enabled delivery of the LANDFALL spyware via zero-day attacks.
  • The spyware was distributed through malicious WhatsApp images in Digital Negative (DNG) format, targeting users mainly in the Middle East.
  • LANDFALL operates as an advanced espionage tool, extracting data such as microphone recordings, location, and contacts without user interaction.
  • The flaw was patched by Samsung in April 2025, months after exploitation began.
  • Analysis suggests possible connections between LANDFALL and the threat actor Stealth Falcon, though no direct links have been confirmed.

A serious security vulnerability identified as CVE-2025-21042 was exploited in zero-day attacks targeting Samsung Galaxy Android devices. This bug, found in the “libimagecodec.quram.so” component, allowed remote attackers to run arbitrary code. The attacks occurred before the flaw was fixed by Samsung in April 2025, according to Palo Alto Networks Unit 42.

- Advertisement -

The zero-day exploit delivered a sophisticated spyware named LANDFALL through malicious images sent via WhatsApp. The harmful files used the Digital Negative (DNG) format, with samples dating back to July 23, 2024. The campaign mainly targeted users located in Iraq, Iran, Turkey, and Morocco, based on submission data analyzed on VirusTotal.

Once installed, LANDFALL can perform extensive surveillance, including recording audio, tracking location, accessing photos, contacts, SMS, files, and call logs. The exploit likely employed a zero-click method, enabling automatic activation without any user interaction. The infected devices ran a shared library extracted from the DNG files, which also altered the device’s SELinux policy—a Linux-based security architecture—to escalate privileges and maintain persistence.

The spyware communicated with a command-and-control (C2) server over an encrypted HTTPS connection, allowing it to receive commands and secondary payloads. The identity of the attackers remains unknown. However, Unit 42 noted similarities between LANDFALL’s C2 infrastructure and domain registration patterns seen in Stealth Falcon, a known threat actor also called FruityArmor. So far, no direct overlaps in attack clusters have been identified.

In a related development, Samsung revealed in September 2025 another vulnerability, CVE-2025-21043, in the same library was exploited in the wild but unrelated to LANDFALL. Around the same period, security firms noted attacks involving flaws in WhatsApp and Apple operating systems, which have since been patched.

- Advertisement -

LANDFALL’s zero-day intrusion underscores the long lifespan of such exploits in public repositories before their full impact is recognized, as mentioned by Unit 42. The comprehensive nature of the spyware and the stealth of its delivery method highlight continuing risks to mobile security in targeted regions.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Critical WordPress Flaw CVE-2025-6389 Exploited in Wild Attack

A remote code execution vulnerability (CVE-2025-6389) in the Sneeit Framework WordPress plugin is being...

ChatGPT Picks Solana and Avalanche to 10x in 2026 Crypto Surge

The cryptocurrency market has shown bullish trends with Bitcoin reaching a high of $126,080...

Binance Secures Three Licenses to Operate in Abu Dhabi’s ADGM

Binance received three licenses from Abu Dhabi’s Financial Services Regulatory Authority (FSRA) for exchange,...

Iran’s MuddyWater Hacks with UDPGangster Malware via Phishing

An Iranian Hacking group called MuddyWater is using a new backdoor Malware named UDPGangster...

XRP Faces Heavy Short Selling, Price Drop Risks Looming

XRP faces significantly higher short-selling positions compared to long positions among traders.Short positions on...
- Advertisement -

Must Read

How to Set Up a Simple Bitcoin Tip Jar for Your Site or Stream

QUICK LINKSWhat a tip jar is, in plain wordsWhat you needBuild a payment link that just worksAdd a QR code that actually scansWhere to...