{"id":364170,"date":"2025-11-08T09:10:26","date_gmt":"2025-11-08T09:10:26","guid":{"rendered":"https:\/\/www.europesays.com\/us\/364170\/"},"modified":"2025-11-08T09:10:26","modified_gmt":"2025-11-08T09:10:26","slug":"samsung-mobile-flaw-exploited-as-zero-day-to-deploy-landfall-android-spyware","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/364170\/","title":{"rendered":"Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware"},"content":{"rendered":"<p><a href=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/mobile-exploit.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/mobile-exploit.jpg\" alt=\"Zero-Day to Deploy LANDFALL Android Spyware\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" title=\"Zero-Day to Deploy LANDFALL Android Spyware\"\/><\/a><\/p>\n<p>A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a &#8220;commercial-grade&#8221; Android spyware dubbed <strong>LANDFALL<\/strong> in targeted attacks in the Middle East.<\/p>\n<p>The activity involved the exploitation of <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-21042\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2025-21042<\/strong><\/a> (CVSS score: 8.8), an out-of-bounds write flaw in the &#8220;libimagecodec.quram.so&#8221; component that could allow remote attackers to execute arbitrary code, according to Palo Alto Networks Unit 42. The issue was <a href=\"https:\/\/security.samsungmobile.com\/securityUpdate.smsb?year=2025&amp;month=04\" target=\"_blank\" rel=\"noopener\">addressed<\/a> by Samsung in April 2025.<\/p>\n<p>&#8220;This vulnerability was actively exploited in the wild before Samsung patched it in April 2025, following reports of in-the-wild attacks,&#8221; Unit 42 <a href=\"https:\/\/unit42.paloaltonetworks.com\/landfall-is-new-commercial-grade-android-spyware\/\" target=\"_blank\" rel=\"noopener\">said<\/a>. Potential targets of the activity, tracked as CL-UNK-1054, are located in Iraq, Iran, Turkey, and Morocco based on VirusTotal submission data.<\/p>\n<p>The development comes as Samsung <a href=\"https:\/\/thehackernews.com\/2025\/09\/samsung-fixes-critical-zero-day-cve.html\" target=\"_blank\" rel=\"noopener\">disclosed<\/a> in September 2025 that another flaw in the same library (CVE-2025-21043, CVSS score: 8.8) had also been exploited in the wild as a zero-day. There is no evidence of this security flaw being weaponized in the LANDFALL campaign. Samsung did not immediately respond to a request for comment.<\/p>\n<p><a href=\"https:\/\/thehackernews.uk\/zz--inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"DFIR Retainer Services\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/zz--inside-d.png\" width=\"729\" height=\"91\"\/><\/a><\/p>\n<p>It&#8217;s assessed that the attacks involved sending via WhatsApp malicious images in the form of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_Negative\" target=\"_blank\" rel=\"noopener\">DNG<\/a> (Digital Negative) files, with evidence of LANDFALL samples going all the way back to July 23, 2024. This is based on DNG artifacts bearing names like &#8220;WhatsApp Image 2025-02-10 at 4.54.17 PM.jpeg&#8221; and &#8220;IMG-20240723-WA0000.jpg.&#8221;<\/p>\n<p>Itay Cohen, senior principal researcher at Palo Alto Networks Unit 42, told The Hacker News that they have not observed any significant functional changes between the samples from July 2024 and February 2025, when the most recent LANDFALL artifact was uploaded to VirusTotal.<\/p>\n<p>LANDFALL, once installed and executed, acts as a comprehensive spy tool, capable of harvesting sensitive data, including microphone recording, location, photos, contacts, SMS, files, and call logs.<\/p>\n<p>While Unit 42 said the exploit chain may have involved the use of a zero-click approach to trigger the exploitation of CVE-2025-21042 without requiring any user interaction, there are currently no indications that it has happened or there exists an unknown security issue in WhatsApp to support this hypothesis.<\/p>\n<p>The Android spyware is specifically designed to target Samsung&#8217;s Galaxy S22, S23, and S24 series devices, as well as Z Fold 4 and Z Flip 4, covering some of the flagship devices from the South Korean electronics chaebol, with the exception of the latest generation.<\/p>\n<tr>\n<td style=\"text-align: center;\"><a href=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/1000031603.png\" style=\"clear: left; display: block; margin-left: auto; margin-right: auto;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/1000031603.png\" alt=\"\" border=\"0\" data-original-height=\"1298\" data-original-width=\"2048\"\/><\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"tr-caption\" style=\"text-align: center;\">Flowchart for LANDFALL spyware<\/td>\n<\/tr>\n<p>It&#8217;s worth noting that around the same time WhatsApp disclosed that a flaw in its messaging app for iOS and macOS (<a href=\"https:\/\/thehackernews.com\/2025\/08\/whatsapp-issues-emergency-update-for.html\" target=\"_blank\" rel=\"noopener\">CVE-2025-55177<\/a>, CVSS score: 5.4) was chained along with <a href=\"https:\/\/thehackernews.com\/2025\/08\/apple-patches-cve-2025-43300-zero-day.html\" target=\"_blank\" rel=\"noopener\">CVE-2025-43300<\/a> (CVSS score: 8.8), a flaw in Apple iOS, iPadOS, and macOS, to potentially target less than 200 users as part of a sophisticated campaign. Apple and WhatsApp have since patched the flaws.<\/p>\n<tr>\n<td style=\"text-align: center;\"><a href=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/1000031615.png\" style=\"clear: left; display: block; margin-left: auto; margin-right: auto;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/1000031615.png\" alt=\"\" border=\"0\" data-original-height=\"1675\" data-original-width=\"2048\"\/><\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"tr-caption\" style=\"text-align: center;\">Timeline for recent malicious DNG image files and associated exploit activity<\/td>\n<\/tr>\n<p>Unit 42&#8217;s analysis of the discovered DNG files show that they come with an embedded ZIP file appended to the end of the file, with the exploit being used to extract a shared object library from the archive to run the spyware. Also present in the archive is another shared object that&#8217;s designed to manipulate the device&#8217;s <a href=\"https:\/\/www.redhat.com\/en\/topics\/linux\/what-is-selinux\" target=\"_blank\" rel=\"noopener\">SELinux<\/a> policy to grant LANDFALL elevated permissions and facilitate persistence.<\/p>\n<p><a href=\"https:\/\/thehackernews.uk\/endpoint-protect-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"CIS Build Kits\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/11\/sem-d.png\" width=\"729\" height=\"91\"\/><\/a><\/p>\n<p>The shared object that loads LANDFALL also communicates with a command-and-control (C2) server over HTTPS to enter into a beaconing loop and receive unspecified next-stage payloads for subsequent execution.<\/p>\n<p>&#8220;At this point, we can&#8217;t share details about the next-stage payloads delivered from the C2 server,&#8221; Cohen said. &#8220;What we can say is that LANDFALL is a modular spyware framework &#8212; the loader we analyzed is clearly designed to fetch and execute additional components from the C2 infrastructure. Those later stages likely extend its surveillance and persistence capabilities, but they weren\u2019t recovered in the samples available to us.&#8221;<\/p>\n<p>It&#8217;s currently not known who is behind the spyware or the campaign. That said, Unit 42 said LANDFALL&#8217;s C2 infrastructure and domain registration patterns dovetail with that of <a href=\"https:\/\/thehackernews.com\/2025\/06\/microsoft-patches-67-vulnerabilities.html\" target=\"_blank\" rel=\"noopener\">Stealth Falcon<\/a> (aka FruityArmor), although, as of October 2025, no direct overlaps between the two clusters have been detected.<\/p>\n<p>The findings suggest that the delivering LANDFALL is likely part of a broader DNG exploitation wave that also hit iPhone devices via the aforementioned exploit chains. They also highlight how sophisticated exploits can remain accessible in public repositories for extended periods of time, flying under the radar until they can be fully analyzed.<\/p>\n<p>&#8220;We don&#8217;t believe this specific exploit is still being used, since Samsung patched it in April 2025,&#8221; Cohen said. &#8220;However, related exploit chains affecting Samsung and iOS devices were observed as recently as August and September, indicating that similar campaigns remained active until very recently. Some infrastructure that might be related to LANDFALL also remains online, which could suggest ongoing or follow-on activity by the same operators.&#8221;<\/p>\n<p>(The story was updated after publication to clarify details surrounding the use of WhatsApp as a distribution vector for the malware and additional insights from Unit 42.)<\/p>\n","protected":false},"excerpt":{"rendered":"A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a &#8220;commercial-grade&#8221;&hellip;\n","protected":false},"author":3,"featured_media":364171,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[13810,13804,13797,13796,13798,13799,13800,13805,13801,13802,13807,346,13808,13806,13803,158,13809,67,132,68],"class_list":{"0":"post-364170","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-computer-security","9":"tag-cyber-attacks","10":"tag-cyber-news","11":"tag-cyber-security-news","12":"tag-cyber-security-news-today","13":"tag-cyber-security-updates","14":"tag-cyber-updates","15":"tag-data-breach","16":"tag-hacker-news","17":"tag-hacking-news","18":"tag-how-to-hack","19":"tag-information-security","20":"tag-network-security","21":"tag-ransomware-malware","22":"tag-software-vulnerability","23":"tag-technology","24":"tag-the-hacker-news","25":"tag-united-states","26":"tag-unitedstates","27":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115513304130198780","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/364170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=364170"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/364170\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/364171"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=364170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=364170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=364170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}